[Git][security-tracker-team/security-tracker][master] Add new grub2 issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Feb 18 20:06:10 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c5b1c2fb by Salvatore Bonaccorso at 2025-02-18T21:05:43+01:00
Add new grub2 issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,87 @@
+CVE-2025-1125 [fs/hfs: Interger overflow may lead to heap based out-of-bounds write]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-1118 [commands/dump: The dump command is not in lockdown when secure boot is enabled]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0690 [read: Integer overflow may lead to out-of-bounds write]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0689 [udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0686 [romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0685 [jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0684 [reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0678 [squash4: Integer overflow may lead to heap based out-of-bounds write when reading data]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0677 [UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0624 [net: Out-of-bounds write in grub_net_search_config_file()]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0622 [command/gpg: Use-after-free due to hooks not being removed on module unload]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45783 [fs/hfs+: refcount can be decremented twice]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45782 [fs/hfs: strcpy() using the volume name (fs/hfs.c:382)]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45781 [fs/ufs: OOB write in the heap]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45780 [fs/tar: Integer Overflow causes Heap OOB Write]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45779 [fs/bfs: Integer overflow leads to Heap OOB Read (Write?) in the BFS parser]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45778 [fs/bfs: Integer overflow in the BFS parser]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45777 [grub-core/gettext: Integer overflow leads to Heap OOB Write]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45776 [grub-core/gettext: Integer overflow leads to Heap OOB Write and Read]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45775 [commands/extcmd: Missing check for failed allocation]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45774 [reader/jpeg: Heap OOB Write during JPEG parsing]
+ - grub2 <unfixed>
+ NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+ NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
CVE-2025-XXXX [Null-deref in xmlPatMatch]
- libxml2 <unfixed>
NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250218/a735c0cd/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list