Description
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
https://security.gentoo.org/glsa/202311-14
Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0
Various Sources
https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20230203-0004/
Scores
CVSS v3
8.6
EPSS
0.0006
EPSS Percentile
19.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Details
CWE
CWE-122
Status
published
Products (12)
fedoraproject/fedora
37
gnu/grub2
< 2.06
redhat/enterprise_linux_eus
9.0
redhat/enterprise_linux_for_power_little_endian_eus
9.0
redhat/enterprise_linux_server_aus
8.2
redhat/enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.1
redhat/enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhat/enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.0
redhat/enterprise_linux_server_tus
8.2
redhat/enterprise_linux_server_update_services_for_sap_solutions
8.1
... and 2 more
Published
Dec 14, 2022
Tracked Since
Feb 18, 2026