Описание
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
devel | not-affected | does not affect Secure Boot |
esm-infra-legacy/trusty | not-affected | does not affect Secure Boot |
esm-infra/bionic | not-affected | does not affect Secure Boot |
esm-infra/focal | not-affected | does not affect Secure Boot |
esm-infra/xenial | not-affected | does not affect Secure Boot |
focal | not-affected | does not affect Secure Boot |
impish | ignored | end of life |
jammy | not-affected | does not affect Secure Boot |
kinetic | not-affected | does not affect Secure Boot |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.187.3~18.04.1 |
devel | not-affected | 1.193 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | not-affected | 1.187.3~18.04.1 |
esm-infra/focal | not-affected | 1.187.3~20.04.1 |
esm-infra/xenial | needed | |
focal | released | 1.187.3~20.04.1 |
jammy | released | 1.187.3~22.04.1 |
kinetic | ignored | end of life |
lunar | not-affected | 1.192 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.06-2ubuntu14.1 |
devel | not-affected | 2.06-2ubuntu17 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 2.06-2ubuntu14.1 |
esm-infra/focal | not-affected | 2.06-2ubuntu14.1 |
esm-infra/xenial | needed | |
focal | released | 2.06-2ubuntu14.1 |
jammy | released | 2.06-2ubuntu14.1 |
kinetic | ignored | end of life |
lunar | not-affected | 2.06-2ubuntu16 |
Показывать по
EPSS
6.4 Medium
CVSS3
Связанные уязвимости
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
There's a use-after-free vulnerability in grub_cmd_chainloader() funct ...
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
EPSS
6.4 Medium
CVSS3