The grub2 menu rendering code miscalculate the memory amount to hold single-quoted strings. This lead to a out-of-bounds write in grub2's heap by one byte per quote in the input. This results to a 'write-what-where' scenario which an attacker may leverage to compromise heap integrity and possibly code execution, leading to Secure Boot circumvention. To an attack being successful deployed, the attacker needs to have high privileges into the targeted system and also triage the heap layout to successfully deploy a crafted payload.
*** This bug has been marked as a duplicate of bug 1926263 ***
Should this CVE be rejected (and alias removed from here)? as duplicate of CVE-2021-20233?
In reply to comment #3: > Should this CVE be rejected (and alias removed from here)? as duplicate of > CVE-2021-20233? Hello, yes, this has been closed as duplicate of CVE-2021-20233 and won't be reported to Mitre. Please consider CVE-2021-20233 as reported at http://www.mail-archive.com/grub-devel@gnu.org/msg31641.html Let me know if you have any doubts or concerns.