// For flags

CVE-2024-45775

Grub2: commands/extcmd: missing check for failed allocation

Severity Score

5.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.

This update for grub2 fixes the following issues. Fixed strcpy overflow in ufs. Fixed a heap-based buffer overflow in hfs. Fixed strcpy overflow in hfs. Fixed an overflow in tar/cpio. Fixed a refcount overflow in hfsplus. Fixed a heap overflow in JPEG parser. Fixed a missing NULL check in extcmd parser. Fixed an overflow in .MO file handling. Fixed an integer overflow in gettext. Fixed bfs filesystem by removing it from lockdown capable modules. Fixed a heap overflow in bfs. Fixed an issue that can bypass TPM-bound disk encryption on SLM encrypted Images. Fixed an out-of-bounds write during the network boot process. Fixed a use-after-free when handling hooks during module unload in command/gpg. Fixed an integer overflow that may lead to an out-of-bounds write through the read command. Fixed an issue where the dump command was not being blocked when grub was in lockdown mode. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs. Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs. Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. Fixed an integer overflow that may lead to an out-of-bounds write in hfs. Fixed an integer overflow that may lead to an out-of-bounds write in squash4.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
Attack Vector
Local
Attack Complexity
High
Authentication
Multiple
Confidentiality
Partial
Integrity
Partial
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-09-08 CVE Reserved
  • 2025-02-18 CVE Published
  • 2025-06-10 CVE Updated
  • 2025-06-20 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-252: Unchecked Return Value
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Red Hat
Search vendor "Red Hat"
Enterprise Linux
Search vendor "Red Hat" for product "Enterprise Linux"
*-
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
*-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
*-
Affected
Redhat
Search vendor "Redhat"
Openshift
Search vendor "Redhat" for product "Openshift"
*-
Affected