Expired Pointer Dereference Affecting grub2 package, versions *


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-GRUB2-14048122
  • published19 Nov 2025
  • disclosed18 Nov 2025

Introduced: 18 Nov 2025

NewCVE-2025-61663  (opens in a new tab)
CWE-825  (opens in a new tab)

How to fix?

There is no fixed version for Debian:11 grub2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2 package and not the grub2 package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.

CVSS Base Scores

version 3.1