CVE-2024-45777

A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
CVSS

No CVSS.

References
Link Resource
https://access.redhat.com/security/cve/CVE-2024-45777 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2346343 Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

28 Jul 2025, 17:26

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.7
v2 : unknown
v3 : unknown
First Time Gnu grub2
Redhat enterprise Linux
Redhat openshift
Redhat
Gnu
CWE CWE-787
References () https://bugzilla.redhat.com/show_bug.cgi?id=2346343 - () https://bugzilla.redhat.com/show_bug.cgi?id=2346343 - Third Party Advisory, Issue Tracking
References () https://access.redhat.com/security/cve/CVE-2024-45777 - () https://access.redhat.com/security/cve/CVE-2024-45777 - Third Party Advisory
CPE cpe:2.3:a:redhat:openshift:4.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

19 Feb 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-19 18:15

Updated : 2025-07-28 17:26


NVD link : CVE-2024-45777

Mitre link : CVE-2024-45777


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • openshift

gnu

  • grub2
CWE

No CWE.