First published: Mon Feb 17 2025(Updated: )
When performing a symlink lookup the grub's UFS module check the inode's data size to allocate the internal buffer for reading the file content however it misses to check if the symlink data size has overflown. If that happens grub_malloc() may be called with a smaller value than needed, as consequence when further reading the data from disk into the buffer grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack may leverage that by crafting a malicious filesystem and as a result it will corrupt data stored in the heap, it's possible that arbitrary code execution may be achieved through it and to be used to by-pass secure boot mechanisms.
Affected Software | Affected Version | How to fix |
---|---|---|
GRUB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346116 is considered to be high due to the potential for memory corruption.
To fix REDHAT-BUG-2346116, it is recommended to update to the latest version of GNU GRUB that contains the security patch.
REDHAT-BUG-2346116 affects the GNU GRUB bootloader software.
The impact of REDHAT-BUG-2346116 can lead to a potential denial of service or unauthorized access due to memory corruption.
Currently, there are no known workarounds for REDHAT-BUG-2346116 other than applying the software update.