Home

Description

A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.

PUBLISHED Reserved 2025-09-29 | Published 2025-11-18 | Updated 2025-11-19 | Assigner redhat




MEDIUM: 4.8CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H

Problem types

Incorrect Calculation of Buffer Size

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-11-10:Reported to Red Hat.
2025-11-18:Made public.

References

www.openwall.com/lists/oss-security/2025/11/18/8

access.redhat.com/security/cve/CVE-2025-61661 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2413827 (RHBZ#2413827) issue-tracking

cve.org (CVE-2025-61661)

nvd.nist.gov (CVE-2025-61661)

Download JSON