漏洞标题
Grub2: command/gpg 模块卸载时未移除挂钩导致的使用已释放内存漏洞
漏洞描述信息
在命令/gpg中发现了一个漏洞。在某些场景下,当相关模块卸载时,加载模块创建的钩子未被移除。此漏洞允许攻击者在注册它的模块卸载后强制grub2调用这些钩子,从而导致使用已释放的内存(use-after-free)漏洞。如果被正确利用,此漏洞可能导致任意代码执行,最终允许攻击者绕过安全启动保护。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
漏洞类别
释放后使用
漏洞标题
Grub2: command/gpg: use-after-free due to hooks not being removed on module unload
漏洞描述信息
A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
漏洞类别
释放后使用