Expired Pointer Dereference Affecting grub2 package, versions *


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-GRUB2-14048129
  • published19 Nov 2025
  • disclosed18 Nov 2025

Introduced: 18 Nov 2025

NewCVE-2025-54771  (opens in a new tab)
CWE-825  (opens in a new tab)

How to fix?

There is no fixed version for Debian:11 grub2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2 package and not the grub2 package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.

CVSS Base Scores

version 3.1