CVE-2025-0622 – Grub2 Command gpg Use-After-Free Arbitrary Code Execution

The following table lists the changes that have been made to the
CVE-2025-0622 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 18, 2025

    Action Type Old Value New Value
    Added Description A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
    Added CVSS V3.1 AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-416
    Added Reference https://access.redhat.com/security/cve/CVE-2025-0622
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2345865
Share the Post:

Related Posts