CVE-2025-0622
Published: February 19, 2025Last modified: June 2, 2025
Description
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.4 |
Attack Vector | LOCAL |
Attack complexity | HIGH |
Privileges required | HIGH |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | grub | Fixed (2.12-r8) |
Stream | grub | Fixed (2.12-r10) |