
17/2/2025

19/2/2025

11/3/2025
CVE-2025-0677: Grub2: ufs: integer overflow may lead to heap based out-of-bounds write when handling symlinks
First published: Mon Feb 17 2025(Updated: )
A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
CentOS Grub2-pc-modules | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2025-0677?
The severity of CVE-2025-0677 is classified as high due to the potential for buffer overflows.
How do I fix CVE-2025-0677?
To fix CVE-2025-0677, update the GRUB 2 software to the latest version provided by the vendor.
What are the potential exploits of CVE-2025-0677?
CVE-2025-0677 can potentially be exploited to cause denial-of-service attacks or arbitrary code execution.
What software is affected by CVE-2025-0677?
CVE-2025-0677 specifically affects the GRUB 2 software developed by GNU.
How does CVE-2025-0677 impact system security?
CVE-2025-0677 impacts system security by allowing attackers to exploit buffer management flaws to manipulate GRUB operations.
- collector/nvd-api
- source/NVD
- agent/references
- agent/weakness
- agent/type
- agent/author
- collector/redhat-bugzilla
- source/Red Hat
- alias/CVE-2025-0677
- agent/description
- agent/first-publish-date
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/title
- agent/last-modified-date
- agent/source
- agent/trending
- agent/event
- agent/softwarecombine
- agent/tags
- agent/guess-ai
- agent/software-canonical-lookup
- vendor/gnu
- canonical/centos grub2-pc-modules
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203