vulnerability
Amazon Linux 2023: CVE-2025-61663: Medium priority package update for grub2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:N/C:P/I:P/A:P) | Nov 18, 2025 | Jan 12, 2026 | Jan 12, 2026 |
Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
Nov 18, 2025
Added
Jan 12, 2026
Modified
Jan 12, 2026
Description
A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
Solutions
amazon-linux-2023-upgrade-grub2-commonamazon-linux-2023-upgrade-grub2-debuginfoamazon-linux-2023-upgrade-grub2-debugsourceamazon-linux-2023-upgrade-grub2-efi-aa64amazon-linux-2023-upgrade-grub2-efi-aa64-cdbootamazon-linux-2023-upgrade-grub2-efi-aa64-ec2amazon-linux-2023-upgrade-grub2-efi-aa64-modulesamazon-linux-2023-upgrade-grub2-efi-x64amazon-linux-2023-upgrade-grub2-efi-x64-cdbootamazon-linux-2023-upgrade-grub2-efi-x64-ec2amazon-linux-2023-upgrade-grub2-efi-x64-modulesamazon-linux-2023-upgrade-grub2-emuamazon-linux-2023-upgrade-grub2-emu-debuginfoamazon-linux-2023-upgrade-grub2-emu-modulesamazon-linux-2023-upgrade-grub2-pcamazon-linux-2023-upgrade-grub2-pc-modulesamazon-linux-2023-upgrade-grub2-toolsamazon-linux-2023-upgrade-grub2-tools-debuginfoamazon-linux-2023-upgrade-grub2-tools-efiamazon-linux-2023-upgrade-grub2-tools-efi-debuginfoamazon-linux-2023-upgrade-grub2-tools-extraamazon-linux-2023-upgrade-grub2-tools-extra-debuginfoamazon-linux-2023-upgrade-grub2-tools-minimalamazon-linux-2023-upgrade-grub2-tools-minimal-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.