CVE-2025-61662
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-18

Last updated on: 2026-04-30

Assigner: Red Hat, Inc.

Description
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-18
Last Modified
2026-04-30
Generated
2026-05-07
AI Q&A
2025-11-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gnu grub 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-416 The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Use-After-Free flaw in GRUB's gettext module. It occurs because the gettext command remains registered in memory even after its module has been unloaded. An attacker can exploit this by invoking the leftover command, causing the application to access invalid memory, which can lead to a crash.


How can this vulnerability impact me? :

Exploiting this vulnerability can cause GRUB to crash, resulting in a Denial of Service (DoS). There is also a possibility, though not confirmed, that data integrity or confidentiality could be compromised.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart