| Release Date: | 2025-02-18 | |
| Impact: | Moderate | What is this? | 
When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.
See more information about CVE-2024-45776 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 6.7 | 
| Vector String: | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 
| Version: | 3.1 | 
| Attack Vector: | Local | 
| Attack Complexity: | Low | 
| Privileges Required: | High | 
| User Interaction: | None | 
| Scope: | Unchanged | 
| Confidentiality Impact: | High | 
| Integrity Impact: | High | 
| Availability Impact: | High | 
| Platform | Errata | Release Date | 
| Oracle Linux version 10 (grub2) | ELSA-2025-16154 | 2025-09-18 | 
| Oracle Linux version 9 (grub2) | ELSA-2025-6990 | 2025-05-16 | 
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: