Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: c5b1c2fb by Salvatore Bonaccorso at 2025-02-18T21:05:43+01:00 Add new grub2 issues - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,87 @@ +CVE-2025-1125 [fs/hfs: Interger overflow may lead to heap based out-of-bounds write] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-1118 [commands/dump: The dump command is not in lockdown when secure boot is enabled] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0690 [read: Integer overflow may lead to out-of-bounds write] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0689 [udf: Heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0686 [romfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0685 [jfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0684 [reiserfs: Integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0678 [squash4: Integer overflow may lead to heap based out-of-bounds write when reading data] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0677 [UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0624 [net: Out-of-bounds write in grub_net_search_config_file()] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2025-0622 [command/gpg: Use-after-free due to hooks not being removed on module unload] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45783 [fs/hfs+: refcount can be decremented twice] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45782 [fs/hfs: strcpy() using the volume name (fs/hfs.c:382)] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45781 [fs/ufs: OOB write in the heap] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45780 [fs/tar: Integer Overflow causes Heap OOB Write] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45779 [fs/bfs: Integer overflow leads to Heap OOB Read (Write?) in the BFS parser] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45778 [fs/bfs: Integer overflow in the BFS parser] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45777 [grub-core/gettext: Integer overflow leads to Heap OOB Write] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45776 [grub-core/gettext: Integer overflow leads to Heap OOB Write and Read] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45775 [commands/extcmd: Missing check for failed allocation] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 +CVE-2024-45774 [reader/jpeg: Heap OOB Write during JPEG parsing] + - grub2 <unfixed> + NOTE: https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html + NOTE: https://www.openwall.com/lists/oss-security/2025/02/18/3 CVE-2025-XXXX [Null-deref in xmlPatMatch] - libxml2 <unfixed> NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c5b1c2fb261bf100b0e56c53ad6ef77608cc487c You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
