There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33175 | There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved. |
Ubuntu USN |
USN-6355-1 | GRUB2 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 24 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-02-13T16:32:37.356Z
Reserved: 2022-04-05T21:59:08.761Z
Link: CVE-2022-28736
Updated: 2024-08-03T06:03:52.084Z
Status : Modified
Published: 2023-07-20T01:15:10.400
Modified: 2024-11-21T06:57:50.070
Link: CVE-2022-28736
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN