A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
2022-12-14T21:15:10.190
2024-11-21T07:01:19.873
Modified
CVSSv3.1: 8.6 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | grub2 | ≤ 2.06 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |
Operating System | redhat | enterprise_linux_eus | 9.0 | Yes |
Operating System | redhat | enterprise_linux_for_power_little_endian_eus | 9.0 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.1 | Yes |
Operating System | redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.0 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.1 | Yes |
Operating System | redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_update_services_for_sap_solutions | 9.0 | Yes |