affected published on 18 Dec 2025 CVE-2025-61661 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH updated 5 days ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 5 days ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 5 days ago @LeSuisse accepted as draft 5 days ago @LeSuisse update 5 days ago update Grub2: out-of-bounds write A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited. Affected products grub2 rhcos Matching in nixpkgs
CVE-2025-61661 4.8 MEDIUM CVSS version: 3.1 Attack vector (AV): PHYSICAL Attack complexity (AC): HIGH Privileges required (PR): NONE User interaction (UI): NONE Scope (S): UNCHANGED Confidentiality impact (C): NONE Integrity impact (I): LOW Availability impact (A): HIGH updated 5 days ago by @LeSuisse Activity log Created automatic suggestion 1 month ago @LeSuisse removed 4 maintainers @SigmaSquadron @hehongbo @digitalrane @CertainLach 5 days ago @LeSuisse removed 2 packages grub2_pvhgrub_image grub2_pvgrub_image 5 days ago @LeSuisse accepted as draft 5 days ago @LeSuisse update 5 days ago update Grub2: out-of-bounds write A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited. Affected products grub2 rhcos Matching in nixpkgs