grub2-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the grub2-common package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Incomplete Cleanup

<1:2.02-156.el8
  • M
Heap-based Buffer Overflow

<1:2.02-156.el8
  • M
Out-of-bounds Read

<1:2.02-156.el8
  • M
Out-of-bounds Write

<1:2.02-142.el8_7.1
  • M
Heap-based Buffer Overflow

<1:2.02-142.el8_7.1
  • H
Buffer Overflow

<1:2.02-123.el8_6.8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<1:2.02-123.el8_6.8
  • H
Integer Underflow

<1:2.02-123.el8_6.8
  • H
Out-of-bounds Write

<1:2.02-123.el8_6.8
  • H
Use After Free

<1:2.02-123.el8_6.8
  • H
Out-of-bounds Write

<1:2.02-123.el8_6.8
  • H
Out-of-bounds Write

<1:2.02-123.el8_6.8
  • H
Out-of-bounds Write

<1:2.02-123.el8_6.8
  • L
Incorrect Default Permissions

<1:2.02-123.el8
  • M
Out-of-bounds Write

<1:2.02-90.el8_3.1
  • M
Out-of-bounds Write

<1:2.02-90.el8_3.1
  • M
Stack-based Buffer Overflow

<1:2.02-90.el8_3.1
  • M
Out-of-bounds Write

<1:2.02-90.el8_3.1
  • M
Improper Authorization

<1:2.02-90.el8_3.1
  • M
Use After Free

<1:2.02-90.el8_3.1
  • M
Incomplete Blacklist

<1:2.02-90.el8_3.1
  • M
Integer Overflow or Wraparound

<1:2.02-87.el8_2
  • M
Out-of-bounds Write

<1:2.02-87.el8_2
  • M
Expected Behavior Violation

<1:2.02-87.el8_2
  • M
Integer Overflow or Wraparound

<1:2.02-87.el8_2
  • M
Integer Overflow or Wraparound

<1:2.02-87.el8_2
  • M
Use After Free

<1:2.02-87.el8_2
  • M
Integer Overflow or Wraparound

<1:2.02-87.el8_2
  • M
Integer Overflow or Wraparound

<1:2.02-87.el8_2
  • M
Privilege Defined With Unsafe Actions

<1:2.02-78.el8_1.1