Описание
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Отчет
This vulnerability has been rated as have the impact of Moderate by the Red Hat Product Security team. This decision was made based in the fact an attacker needs local or physical access to the machine, to execute the gettext command after it was unloaded. Additionally the most likely outcome from an successful attack is a Denial of Crash by leading the grub2 to crash.
Меры по смягчению последствий
There's no known mitigation available for this vulnerability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 7 | grub2 | Affected | ||
| Red Hat OpenShift Container Platform 4 | rhcos | Affected | ||
| Red Hat Enterprise Linux 10 | grub2 | Fixed | RHSA-2026:4649 | 16.03.2026 |
| Red Hat Enterprise Linux 10.0 Extended Update Support | grub2 | Fixed | RHSA-2026:4652 | 16.03.2026 |
| Red Hat Enterprise Linux 8 | grub2 | Fixed | RHSA-2026:4648 | 16.03.2026 |
| Red Hat Enterprise Linux 8.2 Advanced Update Support | grub2 | Fixed | RHSA-2026:4998 | 18.03.2026 |
| Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | grub2 | Fixed | RHSA-2026:4830 | 17.03.2026 |
| Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | grub2 | Fixed | RHSA-2026:4830 | 17.03.2026 |
| Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | grub2 | Fixed | RHSA-2026:4654 | 16.03.2026 |
| Red Hat Enterprise Linux 8.6 Telecommunications Update Service | grub2 | Fixed | RHSA-2026:4654 | 16.03.2026 |
Показывать по
Дополнительная информация
Статус:
7.8 High
CVSS3
Связанные уязвимости
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Grub2: missing unregister call for gettext command may lead to use-after-free
A Use-After-Free vulnerability has been discovered in GRUB's gettext m ...
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
7.8 High
CVSS3