4.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
2 packages
- grub2_pvgrub_image
- grub2_pvhgrub_image
- @LeSuisse removed maintainer @SigmaSquadron
-
@LeSuisse
added
3 maintainers
- @hehongbo
- @digitalrane
- @CertainLach
-
@LeSuisse
removed
3 maintainers
- @hehongbo
- @digitalrane
- @CertainLach
- @LeSuisse accepted
- @LeSuisse published on GitHub
Grub2: missing unregister call for normal_exit command may lead to use-after-free
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
References
- https://access.redhat.com/security/cve/CVE-2025-61664 x_refsource_REDHAT vdb-entry
- RHBZ#2414685 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-61664 x_refsource_REDHAT vdb-entry
- RHBZ#2414685 issue-tracking x_refsource_REDHAT
- RHBZ#2414685 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2025-61664 x_refsource_REDHAT vdb-entry
Affected products
- =<2.14