Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33175 | There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved. |
Ubuntu USN |
USN-6355-1 | GRUB2 vulnerabilities |
Thu, 24 Oct 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-02-13T16:32:37.356Z
Reserved: 2022-04-05T21:59:08.761Z
Link: CVE-2022-28736
Updated: 2024-08-03T06:03:52.084Z
Status : Modified
Published: 2023-07-20T01:15:10.400
Modified: 2024-11-21T06:57:50.070
Link: CVE-2022-28736
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN