A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

There's no available mitigation for this vulnerability.

History

Wed, 19 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 18 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
Title Grub2: missing unregister call for normal commands may lead to use-after-free
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-825
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-19T20:14:28.232Z

Reserved: 2025-09-29T20:18:48.975Z

Link: CVE-2025-61663

cve-icon Vulnrichment

Updated: 2025-11-19T14:27:33.980Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T19:15:50.387

Modified: 2025-11-19T19:14:59.327

Link: CVE-2025-61663

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-18T00:00:00Z

Links: CVE-2025-61663 - Bugzilla

cve-icon OpenCVE Enrichment

No data.