A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
The product dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Grub2 | Ubuntu | esm-infra-legacy/trusty | * |
| Grub2-signed | Ubuntu | esm-infra-legacy/trusty | * |