Bug 2346112 (CVE-2025-0624) - CVE-2025-0624 grub2: net: Out-of-bounds write in grub_net_search_config_file()
Summary: CVE-2025-0624 grub2: net: Out-of-bounds write in grub_net_search_config_file()
Keywords:
Status: NEW
Alias: CVE-2025-0624
Deadline: 2025-02-18
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2346316 2346318 2346315 2346317 2346319
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-17 14:37 UTC by OSIDB Bzimport
Modified: 2025-04-10 21:37 UTC (History)
1 user (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2025:3472 0 None None None 2025-04-01 14:20:19 UTC
Red Hat Product Errata RHBA-2025:3504 0 None None None 2025-04-02 00:46:49 UTC
Red Hat Product Errata RHSA-2025:2521 0 None None None 2025-03-10 15:18:45 UTC
Red Hat Product Errata RHSA-2025:2653 0 None None None 2025-03-11 09:47:23 UTC
Red Hat Product Errata RHSA-2025:2655 0 None None None 2025-03-11 10:44:24 UTC
Red Hat Product Errata RHSA-2025:2675 0 None None None 2025-03-12 06:46:09 UTC
Red Hat Product Errata RHSA-2025:2784 0 None None None 2025-03-13 14:10:03 UTC
Red Hat Product Errata RHSA-2025:2799 0 None None None 2025-03-13 15:39:32 UTC
Red Hat Product Errata RHSA-2025:2867 0 None None None 2025-03-17 01:39:54 UTC
Red Hat Product Errata RHSA-2025:2869 0 None None None 2025-03-17 01:45:13 UTC
Red Hat Product Errata RHSA-2025:3297 0 None None None 2025-04-02 14:35:15 UTC
Red Hat Product Errata RHSA-2025:3301 0 None None None 2025-04-03 00:21:44 UTC
Red Hat Product Errata RHSA-2025:3367 0 None None None 2025-03-27 17:45:49 UTC
Red Hat Product Errata RHSA-2025:3396 0 None None None 2025-03-31 02:03:16 UTC
Red Hat Product Errata RHSA-2025:3573 0 None None None 2025-04-10 21:37:29 UTC
Red Hat Product Errata RHSA-2025:3577 0 None None None 2025-04-10 11:37:42 UTC

Description OSIDB Bzimport 2025-02-17 14:37:17 UTC
During the network boot process when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using grub_strcpy() function. During this step it fails to consider the environment variable length when allocating the internal buffer, resulting in a out-of-bounds write. If correctly exploited this issue may result in remote code execution through the same network segment the grub is searching for the boot information, which can be used to by-pass secure boot protections.

Comment 2 errata-xmlrpc 2025-03-10 15:18:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:2521 https://access.redhat.com/errata/RHSA-2025:2521

Comment 3 errata-xmlrpc 2025-03-11 09:47:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:2653 https://access.redhat.com/errata/RHSA-2025:2653

Comment 4 errata-xmlrpc 2025-03-11 10:44:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2025:2655 https://access.redhat.com/errata/RHSA-2025:2655

Comment 5 errata-xmlrpc 2025-03-12 06:46:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:2675 https://access.redhat.com/errata/RHSA-2025:2675

Comment 6 errata-xmlrpc 2025-03-13 14:10:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:2784 https://access.redhat.com/errata/RHSA-2025:2784

Comment 7 errata-xmlrpc 2025-03-13 15:39:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:2799 https://access.redhat.com/errata/RHSA-2025:2799

Comment 8 errata-xmlrpc 2025-03-17 01:39:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:2867 https://access.redhat.com/errata/RHSA-2025:2867

Comment 9 errata-xmlrpc 2025-03-17 01:45:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:2869 https://access.redhat.com/errata/RHSA-2025:2869

Comment 10 errata-xmlrpc 2025-03-27 17:45:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:3367 https://access.redhat.com/errata/RHSA-2025:3367

Comment 11 errata-xmlrpc 2025-03-31 02:03:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:3396 https://access.redhat.com/errata/RHSA-2025:3396

Comment 12 errata-xmlrpc 2025-04-02 14:35:14 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.17

Via RHSA-2025:3297 https://access.redhat.com/errata/RHSA-2025:3297

Comment 13 errata-xmlrpc 2025-04-03 00:21:43 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.16

Via RHSA-2025:3301 https://access.redhat.com/errata/RHSA-2025:3301

Comment 15 errata-xmlrpc 2025-04-10 11:37:40 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.18

Via RHSA-2025:3577 https://access.redhat.com/errata/RHSA-2025:3577

Comment 16 errata-xmlrpc 2025-04-10 21:37:28 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2025:3573 https://access.redhat.com/errata/RHSA-2025:3573


Note You need to log in before you can comment on or make changes to this bug.