A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 19 Feb 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections. |
Title | grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write. | Grub2: grub-core/gettext: integer overflow leads to heap oob write. |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Wed, 19 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write. | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-19T18:38:59.247Z
Reserved: 2024-09-08T01:57:12.948Z
Link: CVE-2024-45777

Updated: 2025-02-19T18:38:52.262Z

Status : Received
Published: 2025-02-19T18:15:23.210
Modified: 2025-02-19T18:15:23.210
Link: CVE-2024-45777
