Exploit maturity not defined.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade SLES:15.3
grub2-arm64-efi
to version 2.04-150300.22.52.3 or higher.
Note: Versions mentioned in the description apply only to the upstream grub2-arm64-efi
package and not the grub2-arm64-efi
package as distributed by SLES
.
See How to fix?
for SLES:15.3
relevant fixed versions and status.
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.