Source: pcsx2 Version: 1.6.0+dfsg-2 Severity: important Tags: security upstream Forwarded: https://github.com/PCSX2/pcsx2/pull/13693 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]> Control: found -1 1.6.0+dfsg-3 Control: found -1 1.6.0+dfsg-3.1
Hi, The following vulnerability was published for pcsx2. CVE-2025-67749[0]: | PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In | versions 2.5.377 and below, an unchecked offset and size used in a | memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F | handlers allow a specially crafted disc image or ELF to cause an | out-of-bounds read from emulator memory. Because the offset and size | is controlled through MG header fields, a specially crafted ELF can | read data beyond the bounds of mg_buffer and have it reflected back | into emulated memory. This issue is fixed in version 2.5.378. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-67749 https://www.cve.org/CVERecord?id=CVE-2025-67749 [1] https://github.com/PCSX2/pcsx2/security/advisories/GHSA-69wg-97fx-8j5w [2] https://github.com/PCSX2/pcsx2/pull/13693 [3] https://github.com/PCSX2/pcsx2/commit/8164f2b2db6993170aced27d171bdc4e1f2eb5c8 Regards, Salvatore

