First published: Mon Feb 17 2025(Updated: )
When performing a symlink lookup from a romfs filesystem, grub's romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffers size, however it misses to properly check for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the grub_romfs_read_symlink() may cause a out-of-bounds writes when calling grub_disk_read() function. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections.
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu GRUB (GNU GRand Unified Bootloader) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346121 is categorized as high due to potential integer overflow vulnerabilities.
To fix REDHAT-BUG-2346121, update the GNU GRUB to the latest version that addresses this integer overflow issue.
REDHAT-BUG-2346121 affects certain configurations of GNU GRUB that utilize the romfs filesystem module.
The risks associated with REDHAT-BUG-2346121 include potential remote code execution when a malicious filesystem is accessed.
To mitigate the risks of REDHAT-BUG-2346121, avoid using potentially untrusted or malicious filesystems with GRUB.