First published: Fri Feb 14 2025(Updated: )
When reading tar files, grub2 allocates an internal buffer for the file name however it fails to properly verify the allocation against possible Integer Overflows. It's possible to cause the allocation length to overflow with a crafted tar file leading to a head Out-of-bounds write, as consequence an attacker may leverage this to eventually circumvent secure boot protections.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GRUB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2345856 is considered to have a high severity due to the potential for out-of-bounds writes in GRUB 2.
To fix REDHAT-BUG-2345856, you should update GRUB 2 to the latest version provided by your distribution that includes the patch.
The impact of REDHAT-BUG-2345856 may allow attackers to execute arbitrary code or crash the GRUB 2 bootloader.
GRUB 2 versions prior to the patch addressing REDHAT-BUG-2345856 are vulnerable to this issue.
The exploit vector for REDHAT-BUG-2345856 involves using a crafted tar file that triggers integer overflow during file name allocation.