Bug 2364416 (CVE-2025-4382) - CVE-2025-4382 grub2: grub allow access to encrypted device through CLI once root device is unlocked via TPM
Summary: CVE-2025-4382 grub2: grub allow access to encrypted device through CLI once r...
Keywords:
Status: NEW
Alias: CVE-2025-4382
Deadline: 2025-05-08
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-06 14:34 UTC by OSIDB Bzimport
Modified: 2025-05-09 11:41 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-06 14:34:48 UTC
When using encrypted LUKS devices as a disk being unlocked through a TPM device and grub fails to find a underlying filesytem, the boot manager will go into rescue mode and will still have the encryption key in memory. This allows an attacker with physical access to the target machine to access encrypted that through grub CLI which should not be accessible in this scenario.


Note You need to log in before you can comment on or make changes to this bug.