Home

Description

A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.

PUBLISHED Reserved 2025-07-28 | Published 2025-11-18 | Updated 2025-11-19 | Assigner redhat




MEDIUM: 4.9CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Problem types

Expired Pointer Dereference

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-11-10:Reported to Red Hat.
2025-11-18:Made public.

References

www.openwall.com/lists/oss-security/2025/11/18/3

access.redhat.com/security/cve/CVE-2025-54771 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2413823 (RHBZ#2413823) issue-tracking

cve.org (CVE-2025-54771)

nvd.nist.gov (CVE-2025-54771)

Download JSON