Severity
7.8HIGH
EPSS
0.0%
top 92.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMar 11

Description

A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds wr

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangrub2< 2.12-6+1
NVDgnu/grub22.12

Also affects: Enterprise Linux 7.0, 8.0, 9.0, Openshift Container Platform 4.0

🔴Vulnerability Details

3
GHSA
GHSA-q67r-p3hc-x2w9: A flaw was found in grub22025-03-03
OSV
CVE-2025-0678: A flaw was found in grub22025-03-03
CVEList
Grub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data2025-03-03

📋Vendor Advisories

3
Microsoft
Grub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data2025-03-11
Red Hat
grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data2025-02-18
Debian
CVE-2025-0678: grub2 - A flaw was found in grub2. When reading data from a squash4 filesystem, grub's s...2025