Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 950250 (CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125) - sys-boot/grub: Multiple vulnerabilities
Summary: sys-boot/grub: Multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2024-45774, CVE-2024-45775, CVE-2024-45776, CVE-2024-45777, CVE-2024-45778, CVE-2024-45779, CVE-2024-45780, CVE-2024-45781, CVE-2024-45782, CVE-2024-45783, CVE-2025-0622, CVE-2025-0624, CVE-2025-0677, CVE-2025-0678, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686, CVE-2025-0689, CVE-2025-0690, CVE-2025-1118, CVE-2025-1125
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: ?? [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2025-02-24 21:32 UTC by Sam James
Modified: 2025-03-25 17:12 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2025-02-24 21:32:22 UTC
From oss-security (https://marc.info/?l=oss-security&m=173990555202280&w=1):
"""

1) CVE-2024-45774: reader/jpeg: Heap OOB Write during JPEG parsing.
2) CVE-2024-45775: commands/extcmd: Missing check for failed allocation.
3) CVE-2024-45776: grub-core/gettext: Integer overflow leads to Heap OO
                    Write and Read.
4) CVE-2024-45777: grub-core/gettext: Integer overflow leads to Heap OOB
                    Write.
5) CVE-2024-45778: fs/bfs: Integer overflow in the BFS parser.
6) CVE-2024-45779: fs/bfs: Integer overflow leads to Heap OOB Read
                    (Write?) in the BFS parser.
7) CVE-2024-45780: fs/tar: Integer Overflow causes Heap OOB Write.
8) CVE-2024-45781: fs/ufs: OOB write in the heap.
9) CVE-2024-45782: fs/hfs: strcpy() using the volume name (fs/hfs.c:382)
10) CVE-2024-45783: fs/hfs+: refcount can be decremented twice
11) CVE-2025-0622: command/gpg: Use-after-free due to hooks not being
                    removed on module unload
12) CVE-2025-0624: net: Out-of-bounds write in
                    grub_net_search_config_file()
13) CVE-2025-0677: UFS: Integer overflow may lead to heap based
                    out-of-bounds write when handling symlinks
14) CVE-2025-0678: squash4: Integer overflow may lead to heap based
                    out-of-bounds write when reading data
15) CVE-2025-0684: reiserfs: Integer overflow when handling symlinks may
                    lead to heap based out-of-bounds write when reading
                    data
16) CVE-2025-0685: jfs: Integer overflow when handling symlinks may lead
                    to heap based out-of-bounds write when reading data
17) CVE-2025-0686: romfs: Integer overflow when handling symlinks may
                    lead to heap based out-of-bounds write when reading
                    data
18) CVE-2025-0689: udf: Heap based buffer overflow in
                    grub_udf_read_block() may lead to arbitrary code
                    execution
19) CVE-2025-0690: read: Integer overflow may lead to out-of-bounds
                    write
20) CVE-2025-1118: commands/dump: The dump command is not in lockdown
                    when secure boot is enabled
21) CVE-2025-1125: fs/hfs: Integer overflow may lead to heap based
                    out-of-bounds write
"""
Comment 1 jospezial 2025-03-25 09:15:31 UTC
73 security patches:
https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html
Comment 2 Mike Gilbert gentoo-dev 2025-03-25 17:09:04 UTC
The patch series does not apply cleanly on grub-2.12, so this will require some extra work to backport.
Comment 3 Mike Gilbert gentoo-dev 2025-03-25 17:12:54 UTC
I might try grabbing the patches from another distro.