Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-28736

Опубликовано: 20 июл. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.4

Описание

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

does not affect Secure Boot
esm-infra-legacy/trusty

not-affected

does not affect Secure Boot
esm-infra/bionic

not-affected

does not affect Secure Boot
esm-infra/focal

not-affected

does not affect Secure Boot
esm-infra/xenial

not-affected

does not affect Secure Boot
focal

not-affected

does not affect Secure Boot
impish

ignored

end of life
jammy

not-affected

does not affect Secure Boot
kinetic

not-affected

does not affect Secure Boot

Показывать по

РелизСтатусПримечание
bionic

released

1.187.3~18.04.1
devel

not-affected

1.193
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

not-affected

1.187.3~18.04.1
esm-infra/focal

not-affected

1.187.3~20.04.1
esm-infra/xenial

needed

focal

released

1.187.3~20.04.1
jammy

released

1.187.3~22.04.1
kinetic

ignored

end of life
lunar

not-affected

1.192

Показывать по

РелизСтатусПримечание
bionic

released

2.06-2ubuntu14.1
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.06-2ubuntu14.1
esm-infra/focal

not-affected

2.06-2ubuntu14.1
esm-infra/xenial

needed

focal

released

2.06-2ubuntu14.1
jammy

released

2.06-2ubuntu14.1
kinetic

ignored

end of life
lunar

not-affected

2.06-2ubuntu16

Показывать по

EPSS

Процентиль: 7%
0.00029
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
около 3 лет назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

CVSS3: 6.4
nvd
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 6.4
debian
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() funct ...

CVSS3: 6.4
github
почти 2 года назад

There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.

EPSS

Процентиль: 7%
0.00029
Низкий

6.4 Medium

CVSS3

Уязвимость CVE-2022-28736