CVE-2025-0690 – Grub read Command Integer Overflow Vulnerability

The following table lists the changes that have been made to the
CVE-2025-0690 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 24, 2025

    Action Type Old Value New Value
    Added Description The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it’s possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub’s internal critical data and secure boot bypass is not discarded as consequence.
    Added CVSS V3.1 AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-787
    Added Reference https://access.redhat.com/security/cve/CVE-2025-0690
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=2346123
Share the Post:

Related Posts