There's a use-after-free vulnerability in grubcmdchainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }