Executive Summary

Informations
Name CVE-2025-0678 First vendor Publication 2025-03-03
Vendor Cve Last vendor Modification 2025-03-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0678

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Application 1
Os 3

Sources (Detail)

https://access.redhat.com/security/cve/CVE-2025-0678
https://bugzilla.redhat.com/show_bug.cgi?id=2346118
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2025-07-05 14:22:11
  • Multiple Updates
2025-03-25 13:21:46
  • Multiple Updates
2025-03-21 21:20:37
  • Multiple Updates
2025-03-08 00:20:36
  • Multiple Updates
2025-03-03 21:20:32
  • First insertion