vulnerability

Red Hat: CVE-2020-15706: CVE-2020-15706 grub2: Use-after-free redefining a function whilst the same function is already executing (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
Jul 29, 2020
Added
Jul 30, 2020
Modified
Aug 11, 2025

Description

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

Solutions

redhat-upgrade-fwupdredhat-upgrade-fwupd-debuginforedhat-upgrade-fwupd-debugsourceredhat-upgrade-fwupdateredhat-upgrade-fwupdate-debuginforedhat-upgrade-fwupdate-develredhat-upgrade-fwupdate-efiredhat-upgrade-fwupdate-libsredhat-upgrade-grub2redhat-upgrade-grub2-commonredhat-upgrade-grub2-debuginforedhat-upgrade-grub2-debugsourceredhat-upgrade-grub2-efi-aa64-modulesredhat-upgrade-grub2-efi-ia32redhat-upgrade-grub2-efi-ia32-cdbootredhat-upgrade-grub2-efi-ia32-modulesredhat-upgrade-grub2-efi-x64redhat-upgrade-grub2-efi-x64-cdbootredhat-upgrade-grub2-efi-x64-modulesredhat-upgrade-grub2-pcredhat-upgrade-grub2-pc-modulesredhat-upgrade-grub2-ppc-modulesredhat-upgrade-grub2-ppc64-modulesredhat-upgrade-grub2-ppc64le-modulesredhat-upgrade-grub2-toolsredhat-upgrade-grub2-tools-debuginforedhat-upgrade-grub2-tools-efiredhat-upgrade-grub2-tools-efi-debuginforedhat-upgrade-grub2-tools-extraredhat-upgrade-grub2-tools-extra-debuginforedhat-upgrade-grub2-tools-minimalredhat-upgrade-grub2-tools-minimal-debuginforedhat-upgrade-mokutilredhat-upgrade-mokutil-debuginforedhat-upgrade-shim-ia32redhat-upgrade-shim-unsigned-aa64-debuginforedhat-upgrade-shim-unsigned-ia32redhat-upgrade-shim-unsigned-ia32-debuginforedhat-upgrade-shim-unsigned-x64redhat-upgrade-shim-unsigned-x64-debuginforedhat-upgrade-shim-x64
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.