Vigilance.fr - GRUB2: file read/write via Encrypted Disks Shell, analyzed on 19/02/2025
An attacker can bypass access restrictions of GRUB2, via Encrypted Disks Shell, in order to read or alter files. - Security Vulnerability

An attacker can bypass access restrictions of GRUB2, via Encrypted Disks Shell, in order to read or alter files.