Buffer Overflow in GRUB Affects Secure Boot Mechanism
CVE-2022-2601

8.6HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
14 December 2022

Summary

A buffer overflow vulnerability in the GRUB bootloader was identified, where a maliciously crafted pf2 font could exploit the function grub_font_construct_glyph(). This issue arises during the calculation of max_glyph_size, leading to the allocation of insufficient buffer space. Consequently, this flaw can cause a buffer overflow and result in a heap-based out-of-bounds write. Attackers may leverage this vulnerability to bypass the secure boot process, potentially compromising system integrity.

Affected Version(s)

grub2 grub2 2.06 and lower

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.