First published: Mon Feb 17 2025(Updated: )
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu GRUB (GNU GRand Unified Bootloader) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346123 is considered high due to potential buffer overflow vulnerabilities.
To fix REDHAT-BUG-2346123, update to the latest version of GNU GRUB that addresses the buffer overflow issue.
REDHAT-BUG-2346123 affects systems utilizing GNU GRUB for boot management.
Yes, REDHAT-BUG-2346123 can potentially be exploited remotely if an attacker has control over the boot process.
A workaround for REDHAT-BUG-2346123 may involve restricting access to the GRUB bootloader settings to trusted users only.