Grub2 Remote Code Execution Vulnerability During Network Boot Process
A vulnerability has been discovered in grub2 during the network boot process. When searching for the configuration file, grub copies data from a user-controlled environment variable into an internal buffer using the grub_strcpy() function. The function does not properly check the environment variable length when allocating the internal buffer, which leads to an out-of-bounds write. If successfully exploited, this vulnerability could enable remote code execution within the same network segment where grub is searching for boot information. This could potentially allow an attacker to bypass secure boot protections.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
red hat red hat enterprise linux 7 |
||
red hat red hat enterprise linux 8 |
||
red hat red hat enterprise linux 9 |
||
red hat red hat openshift container platform 4 |