发布时间: 2025年3月4日
修改时间: 2025年3月14日
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Physical | |
CVSS评分 | N/A | 6.1 |
Attack Complexity | Low | |
Privileges Required | High | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | Required | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-1646 | grub2 security update | 2025年3月24日 |
KylinSec-SA-2025-2437 | grub2 security update | 2025年6月3日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | grub2 | Fixed |
KY3.5.3 | grub2 | Fixed |
V6 | grub2 | Fixed |