First published: Mon Feb 17 2025(Updated: )
When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections.
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu GRUB (GNU GRand Unified Bootloader) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346138 has not been explicitly classified in public advisories.
To fix REDHAT-BUG-2346138, update to the latest version of GNU GRUB that addresses this vulnerability.
REDHAT-BUG-2346138 affects the hfs filesystem module within the GNU GRUB bootloader.
REDHAT-BUG-2346138 describes an integer overflow vulnerability when calculating buffer sizes from user-controlled parameters in hfs filesystem metadata.
Yes, exploiting REDHAT-BUG-2346138 could lead to potential security issues such as arbitrary code execution or system crashes.