Untriaged
Permalink
CVE-2025-0622
6.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Grub2: command/gpg: use-after-free due to hooks not being removed on module unload
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
References
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2025-0622 x_refsource_REDHAT vdb-entry
- RHBZ#2345865 issue-tracking x_refsource_REDHAT
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
Affected products
grub2
- =<2.12
- *
rhcos
Matching in nixpkgs
pkgs.grub2_pvgrub_image
PvGrub2 image for booting PV Xen guests
pkgs.grub2_pvhgrub_image
PvGrub2 image for booting PVH Xen guests
Package maintainers
-
@hehongbo Hongbo
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>