[Git][security-tracker-team/security-tracker][master] Add new grub2 issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Feb 18 20:06:10 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c5b1c2fb by Salvatore Bonaccorso at 2025-02-18T21:05:43+01:00
Add new grub2 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,87 @@
+CVE-2025-1125 [fs/hfs: Interger overflow may lead to heap based out-of-bounds write]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-1118 [commands/dump: The dump command is not in lockdown when secure boot is enabled]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0690 [read: Integer overflow may lead to out-of-bounds write]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0689 [udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0686 [romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0685 [jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0684 [reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0678 [squash4: Integer overflow may lead to heap based out-of-bounds write when reading data]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0677 [UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0624 [net: Out-of-bounds write in grub_net_search_config_file()]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2025-0622 [command/gpg: Use-after-free due to hooks not being removed on module unload]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45783 [fs/hfs+: refcount can be decremented twice]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45782 [fs/hfs: strcpy() using the volume name (fs/hfs.c:382)]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45781 [fs/ufs: OOB write in the heap]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45780 [fs/tar: Integer Overflow causes Heap OOB Write]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45779 [fs/bfs: Integer overflow leads to Heap OOB Read (Write?) in the BFS parser]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45778 [fs/bfs: Integer overflow in the BFS parser]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45777 [grub-core/gettext: Integer overflow leads to Heap OOB Write]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45776 [grub-core/gettext: Integer overflow leads to Heap OOB Write and Read]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45775 [commands/extcmd: Missing check for failed allocation]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
+CVE-2024-45774 [reader/jpeg: Heap OOB Write during JPEG parsing]
+	- grub2 <unfixed>
+	NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
+	NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3
 CVE-2025-XXXX [Null-deref in xmlPatMatch]
 	- libxml2 <unfixed>
 	NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/861



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250218/a735c0cd/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list