
14/2/2025

3/3/2025

3/3/2025
CVE-2024-45779: Grub2: fs/bfs: integer overflow leads to heap oob read in the bfs parser
First published: Fri Feb 14 2025(Updated: )
An integer overflow flaw was found in the BFS file system driver in grub2. When reading a file with an indirect extent map, grub2 fails to validate the number of extent entries to be read. A crafted or corrupted BFS filesystem may cause an integer overflow during the file reading, leading to a heap of bounds read. As a consequence, sensitive data may be leaked, or grub2 will crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
CentOS Grub2-pc-modules | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-45779?
CVE-2024-45779 has been rated as a medium severity vulnerability.
How do I fix CVE-2024-45779?
To mitigate CVE-2024-45779, upgrade to the latest version of the grub2 package that includes the security patch.
What systems are affected by CVE-2024-45779?
CVE-2024-45779 affects systems using the GNU grub2 file system driver, particularly those with a BFS filesystem.
What impact does CVE-2024-45779 have?
CVE-2024-45779 can potentially lead to system crashes or improper file handling due to an integer overflow during file reading.
Is CVE-2024-45779 exploit possible?
Yes, CVE-2024-45779 can be exploited if a malicious or corrupted BFS filesystem is used.
- collector/mitre-cve
- source/MITRE
- agent/title
- agent/references
- agent/weakness
- agent/type
- collector/redhat-bugzilla
- source/Red Hat
- alias/CVE-2024-45779
- agent/first-publish-date
- agent/description
- agent/guess-ai
- agent/software-canonical-lookup
- agent/softwarecombine
- collector/nvd-api
- source/NVD
- agent/last-modified-date
- agent/severity
- agent/source
- agent/author
- agent/tags
- agent/trending
- agent/event
- vendor/gnu
- canonical/centos grub2-pc-modules
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203