There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-02-13T16:32:37.356Z
Reserved: 2022-04-05T21:59:08.761Z
Link: CVE-2022-28736

Updated: 2024-08-03T06:03:52.084Z

Status : Modified
Published: 2023-07-20T01:15:10.400
Modified: 2024-11-21T06:57:50.070
Link: CVE-2022-28736
