First published: Mon Feb 17 2025(Updated: )
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Grub2-pc-modules |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0690 is considered to have a high severity due to potential buffer overflow vulnerabilities.
To fix CVE-2025-0690, update your GNU Grub2 software to the latest version provided by your distributor.
CVE-2025-0690 affects certain versions of GNU Grub2, particularly those with vulnerabilities in their read command implementation.
The potential impacts of CVE-2025-0690 include arbitrary code execution and system compromise due to buffer overflow exploitation.
You can verify vulnerability to CVE-2025-0690 by checking your Grub2 version against the affected versions listed by security advisories.