First published: Tue Feb 18 2025(Updated: )
The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow leading to a Out-of-bound write. This may be leveraged by an attacker to overwrite senstive grub2's heap data, eventually leading to the circumvention of secure boot protections.
Affected Software | Affected Version | How to fix |
---|---|---|
GRUB |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346343 is high due to the potential for an out-of-bounds write that can lead to a secure boot circumvention.
To mitigate REDHAT-BUG-2346343, ensure that you are using the latest version of GNU GRUB with the applied patches.
Users of GNU GRUB are affected by REDHAT-BUG-2346343, especially those utilizing secure boot configurations.
An attacker exploiting REDHAT-BUG-2346343 may overwrite sensitive heap data in grub2, which can compromise the integrity of secure boot.
The vulnerability in REDHAT-BUG-2346343 occurs due to an overflow in the calculation of the translation buffer when reading a language .mo file.