First published: Mon Feb 17 2025(Updated: )
When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu GRUB (GNU GRand Unified Bootloader) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1125 is classified as a high severity vulnerability due to its potential for integer overflow that may lead to memory corruption.
To fix CVE-2025-1125, update to the latest version of GNU GRUB that includes patches addressing this vulnerability.
CVE-2025-1125 affects systems utilizing GNU GRUB, particularly those using the hfs filesystem.
CVE-2025-1125 exploits integer overflows caused by mishandling user-controlled parameters in filesystem metadata.
Yes, a maliciously crafted hfs filesystem targeted at a vulnerable GRUB installation may lead to remote code execution.