Vulnerability Description
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2025-61664
- https://bugzilla.redhat.com/show_bug.cgi?id=2414685
- https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
FAQ
What is CVE-2025-61664?
CVE-2025-61664 is a vulnerability with a CVSS score of 4.9 (MEDIUM). A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its...
How severe is CVE-2025-61664?
CVE-2025-61664 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-61664?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.