First published: Tue Feb 18 2025(Updated: )
A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Grub2-pc-modules |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45777 has been classified as a critical severity vulnerability due to the potential for an attacker to overwrite sensitive heap data.
To fix CVE-2024-45777, update to the latest stable version of GNU GRUB 2 that addresses this vulnerability.
Exploiting CVE-2024-45777 may allow an attacker to perform arbitrary code execution by overwriting critical memory areas in GRUB 2.
CVE-2024-45777 affects certain versions of GNU GRUB 2 prior to the patch addressed in the latest release.
An attacker can exploit CVE-2024-45777 by manipulating the language .mo files processed by GRUB 2, leading to a potential out-of-bounds write.