Vulnerabilities > CVE-2022-28736 - Use After Free vulnerability in GNU Grub2
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Common Weakness Enumeration (CWE)
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736
- https://security.netapp.com/advisory/ntap-20230825-0002/
- https://security.netapp.com/advisory/ntap-20230825-0002/
- https://www.openwall.com/lists/oss-security/2022/06/07/5
- https://www.openwall.com/lists/oss-security/2022/06/07/5