Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-28736

Опубликовано: 07 июн. 2022
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

A use-after-free vulnerability was found on grub2's chainloader command. This flaw allows an attacker to gain access to restricted data or cause arbitrary code execution if they can establish control from grub's memory allocation pattern.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7grub2Out of support scope
Red Hat Enterprise Linux 8grub2FixedRHSA-2022:509516.06.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionsgrub2FixedRHSA-2022:509816.06.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportgrub2FixedRHSA-2022:510016.06.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportgrub2FixedRHSA-2022:509616.06.2022
Red Hat Enterprise Linux 9grub2FixedRHSA-2022:509916.06.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2092613grub2: use-after-free in grub_cmd_chainloader()

EPSS

Процентиль: 7%
0.00029
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

CVSS3: 6.4
nvd
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 6.4
debian
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() funct ...

CVSS3: 6.4
github
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

EPSS

Процентиль: 7%
0.00029
Низкий

7 High

CVSS3