A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
History

Wed, 19 Nov 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 18 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Tue, 18 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
Description A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Title Grub2: missing unregister call for gettext command may lead to use-after-free
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-11-18T18:20:48.351Z

Updated: 2025-11-18T22:03:43.738Z

Reserved: 2025-09-29T20:18:48.975Z

Link: CVE-2025-61662

cve-icon Vulnrichment

Updated: 2025-11-18T22:03:43.738Z

cve-icon NVD

Status : Received

Published: 2025-11-18T19:15:50.203

Modified: 2025-11-18T22:15:51.307

Link: CVE-2025-61662

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-18T00:00:00Z

Links: CVE-2025-61662 - Bugzilla