vulnerability
Red Hat: CVE-2025-0622: grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:H/Au:M/C:C/I:C/A:C) | Feb 18, 2025 | May 15, 2025 | May 15, 2025 |
Severity
6
CVSS
(AV:L/AC:H/Au:M/C:C/I:C/A:C)
Published
Feb 18, 2025
Added
May 15, 2025
Modified
May 15, 2025
Description
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
Solution(s)
redhat-upgrade-grub2-commonredhat-upgrade-grub2-debuginforedhat-upgrade-grub2-debugsourceredhat-upgrade-grub2-efi-aa64-modulesredhat-upgrade-grub2-efi-x64redhat-upgrade-grub2-efi-x64-cdbootredhat-upgrade-grub2-efi-x64-modulesredhat-upgrade-grub2-emu-debuginforedhat-upgrade-grub2-pcredhat-upgrade-grub2-pc-modulesredhat-upgrade-grub2-ppc64le-modulesredhat-upgrade-grub2-toolsredhat-upgrade-grub2-tools-debuginforedhat-upgrade-grub2-tools-efiredhat-upgrade-grub2-tools-efi-debuginforedhat-upgrade-grub2-tools-extraredhat-upgrade-grub2-tools-extra-debuginforedhat-upgrade-grub2-tools-minimalredhat-upgrade-grub2-tools-minimal-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.