CVE-2025-61662
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a flaw in GRUB's gettext module to crash the system, leading to a Denial of Service. This happens because the system mistakenly keeps a command in memory after it should have been removed, allowing the attacker to trigger errors when that command is called.
Technical Description
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Nov 18, 2025
5 months ago
Last Modified
Mar 17, 2026
22 days ago
Vendor
gnu
Product
grub2
Related Vulnerabilities
This vulnerability allows an attacker to run malicious code on a victim's system by tricking them into opening a specially crafted ISO 9660 image file. It affects libcdio version 2.2.0 and can be exploited if the attacker can get the victim to use this outdated version of the software.
This vulnerability allows an attacker to crash applications or read sensitive information from memory by providing a specially crafted input to the wordexp function in the GNU C Library. It can be exploited when the function is used with untrusted data, potentially leading to service disruptions or data leaks.