First published: Mon Feb 17 2025(Updated: )
A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Grub2-pc-modules |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0685 has been rated as critical due to the potential for arbitrary code execution from a malicious JFS filesystem.
To mitigate CVE-2025-0685, update to the latest version of GRUB2 that has patched this vulnerability.
CVE-2025-0685 affects systems running GNU GRUB2 that utilize JFS filesystems, particularly those without the latest security updates.
CVE-2025-0685 can lead to significant security risks, including the possibility of an attacker gaining unauthorized access to system resources.
Yes, CVE-2025-0685 specifically involves vulnerabilities in the GRUB2 filesystem module when handling JFS filesystems.