Bug 2346118 (CVE-2025-0678) - CVE-2025-0678 grub2: squash4: Integer overflow may lead to heap based out-of-bounds write when reading data
Summary: CVE-2025-0678 grub2: squash4: Integer overflow may lead to heap based out-of-...
Keywords:
Status: NEW
Alias: CVE-2025-0678
Deadline: 2025-02-18
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-17 15:12 UTC by OSIDB Bzimport
Modified: 2025-02-19 17:59 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-17 15:12:10 UTC
When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffers size, however it misses to properly check for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result
in arbitrary code execution by-passing secure boot protections.


Note You need to log in before you can comment on or make changes to this bug.