CVE-2025-54771
Grub2: use-after-free in grub_file_close()
CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th
A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
| CWE | CWE-825 |
| Vendor | gnu |
| Product | grub2 |
| Published | Nov 18, 2025 |
| Last Updated | Dec 19, 2025 |
Stay Ahead of the Next One
Get instant alerts for gnu grub2
Be the first to know when new medium vulnerabilities affecting gnu grub2 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
GNU / grub2
0 โค 2.14
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 7
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat OpenShift Container Platform 4
All versions affected