Name | CVE-2025-0685 |
Description | A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1098319 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
grub2 (PTS) | bullseye (security), bullseye | 2.06-3~deb11u6 | vulnerable |
bookworm, bookworm (security) | 2.06-13+deb12u1 | vulnerable | |
sid, trixie | 2.12-7 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
grub2 | source | (unstable) | 2.12-6 | 1098319 |
https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
https://www.openwall.com/lists/oss-security/2025/02/18/3