GRUB2 Memory Leak

MEDIUM (4.9) No Patch (27 days)

Threat Intelligence

Low Risk
EPSS Score: 0.02% chance of exploitation (percentile: 3%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The GRUB2 bootloader is a widely used open-source boot loader for Linux systems. This vulnerability occurs in the normal module of GRUB2 due to a memory Use After Free issue. An attacker can exploit this condition by invoking the normal_exit command after the related module has been removed, causing the system to improperly access a previously freed memory location.

Am I affected?

You're affected if you use GRUB2 versions 2.06-2.08. This is a specific version range of the bootloader, so it's essential to check your GRUB2 version to determine if you're impacted. To verify your GRUB2 version, run the following command: grub --version

Note that this vulnerability does not affect other bootloaders like LILO or UEFI.

Affected Products

Red Hat / GRUB2

How to fix

To fix this issue, update to a newer version of GRUB2. You can download the latest version from the official Red Hat website:

Alternatively, you can apply the following immediate mitigations:

  • Restrict network access to your GRUB2 instance (firewall it from the public internet)
  • Audit GRUB2 configuration for suspicious settings
  • Monitor for unusual GRUB2 behavior