{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T02:39:14.743","vulnerabilities":[{"cve":{"id":"CVE-2024-2312","sourceIdentifier":"security@ubuntu.com","published":"2024-04-05T20:15:09.020","lastModified":"2025-08-26T17:17:34.323","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass."},{"lang":"es","value":"GRUB2 no llama a las funciones fini del módulo al salir, lo que hace que el módulo peimage GRUB2 de Debian/Ubuntu deje los ganchos de la tabla del sistema UEFI después de la salida. Esto conduce a una condición de use-after-free y posiblemente podría conducir a una omisión de arranque segura."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*","versionEndExcluding":"2.12-1ubuntu5","matchCriteriaId":"AB8E628D-0E77-406B-A205-1065F9680576"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*","matchCriteriaId":"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*","matchCriteriaId":"AD7447BC-F315-4298-A822-549942FC118B"}]}]}],"references":[{"url":"https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127","source":"security@ubuntu.com","tags":["Exploit","Issue Tracking","Patch"]},{"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240426-0003/","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking","Patch"]},{"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20240426-0003/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}