{"id":"CVE-2022-28736","details":"There's a use-after-free vulnerability in grub_cmd_chainloader() function; The chainloader command is used to boot up operating systems that doesn't support multiboot and do not have direct support from GRUB2. When executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the GRUB2's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be achieved.","modified":"2026-03-14T11:39:55.057910Z","published":"2023-07-20T01:15:10.400Z","related":["ALSA-2022:5095","ALSA-2022:5099","SUSE-SU-2022:2035-1","SUSE-SU-2022:2036-1","SUSE-SU-2022:2037-1","SUSE-SU-2022:2038-1","SUSE-SU-2022:2039-1","SUSE-SU-2022:2041-1","SUSE-SU-2022:2064-1","SUSE-SU-2022:2073-1","SUSE-SU-2022:2074-1","openSUSE-SU-2024:12137-1"],"references":[{"type":"ADVISORY","url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230825-0002/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2022/06/07/5"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-28736.json","unresolved_ranges":[{"events":[{"introduced":"2.00"},{"fixed":"2.06-3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}