
14/2/2025

18/2/2025

15/3/2025
CVE-2025-0622: Grub2: command/gpg: use-after-free due to hooks not being removed on module unload
First published: Fri Feb 14 2025(Updated: )
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
CentOS Grub2-pc-modules | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2025-0622?
CVE-2025-0622 is classified as a use-after-free vulnerability, which can potentially allow attackers to execute arbitrary code.
How do I fix CVE-2025-0622?
To mitigate CVE-2025-0622, it is recommended to update to the latest version of GNU GRUB2 that addresses this vulnerability.
Which versions of GRUB2 are affected by CVE-2025-0622?
CVE-2025-0622 affects various versions of GNU GRUB2, specifically those that utilize modules with improperly managed hooks.
Can CVE-2025-0622 lead to remote code execution?
Yes, CVE-2025-0622 has the potential to lead to remote code execution if exploited by a malicious actor.
How can I check if my system is vulnerable to CVE-2025-0622?
You can check for vulnerability to CVE-2025-0622 by evaluating your installed version of GNU GRUB2 against security advisories.
- collector/redhat-bugzilla
- source/Red Hat
- alias/CVE-2025-0622
- agent/references
- agent/title
- agent/type
- agent/description
- agent/first-publish-date
- agent/softwarecombine
- collector/nvd-api
- source/NVD
- agent/last-modified-date
- agent/severity
- agent/author
- agent/source
- agent/trending
- agent/event
- agent/tags
- collector/mitre-cve
- source/MITRE
- agent/weakness
- agent/guess-ai
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/gnu
- canonical/centos grub2-pc-modules
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203