Filters

CVE-2024-1048Grub2: grub2-set-bootflag can be abused by local (pseudo-)users

3.3
First published (updated )

ubuntu/grub2-unsignedGrub2: out-of-bounds read at fs/ntfs.c

First published (updated )

ubuntu/grub2-unsignedGrub2: out-of-bounds write at fs/ntfs.c may lead to unsigned code execution

7.8
First published (updated )

Fedoraproject FedoraGrub2: bypass the grub password protection feature

First published (updated )

Microsoft Windows 10Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequence…

7.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows 10Buffer Overflow

8.6
First published (updated )

redhat/grub2There's a use-after-free vulnerability in grub_cmd_chainloader() function

7.8
First published (updated )

redhat/grub2A flaw was found in grub2. The shim_lock verifier from grub2 allows non-kernel files to be loaded wh…

7.8
First published (updated )

redhat/grub2Out-of-bounds write when handling split HTTP headers

First published (updated )

redhat/grub2Integer underflow in grub_net_recv_ip4_packets

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gnu Grub2grub2-once uses fixed file name in /var/tmp

First published (updated )

Gnu Grub2GRUB2 grub.cfg configuration file is created with the wrong permission (0644) allowing unprivileged …

3.3
First published (updated )

redhat/grub2A flaw was found in grub2 when handling JPEG images. This flaw allows an attacker to craft a malicio…

7.5
First published (updated )

redhat/grub2A flaw was found in grub2 when handling a PNG image header. When decoding the data contained in the …

First published (updated )

redhat/grub2A flaw was found in grub 2, where a crafted 16-bit grayscale PNG image may lead to an out-of-bounds …

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/grubIf certificates that signed grub are installed into db, grub can be booted directly. It will then bo…

First published (updated )

Redhat Enterprise Linux Server AusThere's a flaw on grub2 menu rendering code setparam_prefix() in the menu rendering code performs a …

8.2
First published (updated )

Redhat Enterprise Linux Server AusThe option parser in grub2 allows an attacker to write past the end of a heap-allocated buffer by ca…

7.2
First published (updated )

Redhat Enterprise Linux Server AusThe grub2's cutmem command does not honor secure boot locking. This allows an privileged attacker to…

7.5
First published (updated )

Redhat Enterprise Linux Server Ausgrub_parser_split_cmdline expands variable names present in the supplied command line in to their co…

7.2
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Redhat Enterprise Linux Server AusA flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors a…

7.6
First published (updated )

Redhat Enterprise Linux Server AusUse After Free

8.2
First published (updated )

Redhat Enterprise Linux Server AusGRUB2 enables the use of the command acpi even when secure boot is signaled by the firmware. An atta…

7.5
First published (updated )

redhat/grub2GRUB2 contained integer overflows when handling the initrd command, leading to a heap-based buffer overflow.

First published (updated )

redhat/grub2GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/grub2GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim

First published (updated )

redhat/grub2Buffer Overflow, Integer Overflow

First published (updated )

redhat/grub2Buffer Overflow, Integer Overflow

First published (updated )

redhat/grub2Buffer Overflow, Integer Overflow

First published (updated )

redhat/grub2Integer Overflow, Buffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/grub2Buffer Overflow, OS Command Injection

8.2
First published (updated )

Gnu Grub2A flaw was found in the grub2-set-bootflag utility of grub2. When the utility is run under resource …

First published (updated )

Gnu Grub2Integer Underflow

7.4
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203