4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
ignored
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
- @LeSuisse deleted maintainer @SigmaSquadron maintainer.delete
-
@LeSuisse
added
maintainer.add
2 maintainers
- @hehongbo
- @digitalrane
-
@LeSuisse
deleted
maintainer.delete
2 maintainers
- @hehongbo
- @digitalrane
- @LeSuisse accepted
- @LeSuisse published on GitHub
Grub2: use-after-free in grub_file_close()
A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
References
Affected products
- =<2.14
Ignored packages (2)
pkgs.grub2_pvgrub_image
PvGrub2 image for booting PV Xen guests
pkgs.grub2_pvhgrub_image
PvGrub2 image for booting PVH Xen guests