Описание
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | ignored  | end of standard support, was needed | 
| devel | not-affected  | does not affect Secure Boot | 
| esm-infra-legacy/trusty | not-affected  | does not affect Secure Boot | 
| esm-infra/bionic | not-affected  | does not affect Secure Boot | 
| esm-infra/focal | not-affected  | does not affect Secure Boot | 
| esm-infra/xenial | not-affected  | does not affect Secure Boot | 
| focal | not-affected  | does not affect Secure Boot | 
| impish | ignored  | end of life | 
| jammy | not-affected  | does not affect Secure Boot | 
| kinetic | not-affected  | does not affect Secure Boot | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | released  | 1.187.3~18.04.1 | 
| devel | not-affected  | 1.193 | 
| esm-infra-legacy/trusty | needs-triage  | |
| esm-infra/bionic | released  | 1.187.3~18.04.1 | 
| esm-infra/focal | released  | 1.187.3~20.04.1 | 
| esm-infra/xenial | needed  | |
| focal | released  | 1.187.3~20.04.1 | 
| jammy | released  | 1.187.3~22.04.1 | 
| kinetic | ignored  | end of life | 
| lunar | not-affected  | 1.192 | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | released  | 2.06-2ubuntu14.1 | 
| devel | not-affected  | 2.06-2ubuntu17 | 
| esm-infra-legacy/trusty | DNE  | |
| esm-infra/bionic | released  | 2.06-2ubuntu14.1 | 
| esm-infra/focal | released  | 2.06-2ubuntu14.1 | 
| esm-infra/xenial | needed  | |
| focal | released  | 2.06-2ubuntu14.1 | 
| jammy | released  | 2.06-2ubuntu14.1 | 
| kinetic | ignored  | end of life | 
| lunar | not-affected  | 2.06-2ubuntu16 | 
Показывать по
6.4 Medium
CVSS3
Связанные уязвимости
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
There's a use-after-free vulnerability in grub_cmd_chainloader() funct ...
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
6.4 Medium
CVSS3