安全公告详情

NS-SA-2025-0169

2025-07-25 16:49:52

简介

important: grub2/git security update

严重级别

important

主题

An update for grub2/git is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

grub2:
git:


Security Fix(es):
grub2: A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.(CVE-2024-1048)
grub2: A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.(CVE-2024-45778)
grub2: An integer overflow flaw was found in the BFS file system driver in grub2. When reading a file with an indirect extent map, grub2 fails to validate the number of extent entries to be read. A crafted or corrupted BFS filesystem may cause an integer overflow during the file reading, leading to a heap of bounds read. As a consequence, sensitive data may be leaked, or grub2 will crash.(CVE-2024-45779)
grub2: A flaw was found in the HFS filesystem. When reading an HFS volume's name at grub_fs_mount(), the HFS filesystem driver performs a strcpy() using the user-provided volume name as input without properly validating the volume name's length. This issue may read to a heap-based out-of-bounds writer, impacting grub's sensitive data integrity and eventually leading to a secure boot protection bypass.(CVE-2024-45782)
grub2: A flaw was found in the HFS file system driver in grub2. This issue allows a local attacker to trigger a heap-based buffer overflow via a specially crafted sblock in a malicious HFS file system, causing memory corruption, unexpected behavior, and denial of service.(CVE-2024-56737)
grub2: A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.(CVE-2025-0678)
grub2: When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections.(CVE-2025-1125)
grub2: bugfix
git: A vulnerability was found in Git. This vulnerability allows the malicious manipulation of repositories containing submodules, exploiting a bug that enables the writing of files into the .git/ directory instead of the submodule's intended worktree. This manipulation facilitates the execution of arbitrary code during the cloning process, bypassing user inspection and control.(CVE-2024-32002)
git: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.03B8.

影响组件

  • grub2
  • git

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["grub2-tools-minimal-2.12-8.zncgsl7.18.x86_64.rpm","grub2-tools-extra-2.12-8.zncgsl7.18.x86_64.rpm","grub2-pc-2.12-8.zncgsl7.18.x86_64.rpm","grub2-tools-efi-2.12-8.zncgsl7.18.x86_64.rpm","grub2-tools-2.12-8.zncgsl7.18.x86_64.rpm","grub2-pc-modules-2.12-8.zncgsl7.18.noarch.rpm","grub2-efi-x64-modules-2.12-8.zncgsl7.18.noarch.rpm","grub2-efi-x64-2.12-8.zncgsl7.18.x86_64.rpm","grub2-common-2.12-8.zncgsl7.18.noarch.rpm"],"source":"grub2-2.12-8.zncgsl7.18.src.rpm"},{"binary":["perl-Git-2.41.0-1.zncgsl7.3.noarch.rpm","git-core-2.41.0-1.zncgsl7.3.x86_64.rpm","git-2.41.0-1.zncgsl7.3.x86_64.rpm","git-core-doc-2.41.0-1.zncgsl7.3.noarch.rpm"],"source":"git-2.41.0-1.zncgsl7.3.src.rpm"}]}]}

CVE

参考