Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 13 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:10 |
Wed, 14 May 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:9 |
Tue, 13 May 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:9::baseos | |
References |
|
Wed, 05 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 24 Feb 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 24 Feb 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. |
Title | grub2: read: Integer overflow may lead to out-of-bounds write | Grub2: read: integer overflow may lead to out-of-bounds write |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Wed, 19 Feb 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | grub2: read: Integer overflow may lead to out-of-bounds write | |
Weaknesses | CWE-190 CWE-787 |
|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-30T21:11:02.283Z
Reserved: 2025-01-23T20:01:36.565Z
Link: CVE-2025-0690

Updated: 2025-02-24T11:18:03.398Z

Status : Awaiting Analysis
Published: 2025-02-24T08:15:09.503
Modified: 2025-05-13T20:15:25.903
Link: CVE-2025-0690


No data.