CVE Vulnerabilities

CVE-2020-25632

Use After Free

Published: Mar 03, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
Grub2Gnu*2.06 (excluding)
Red Hat Enterprise Linux 7RedHatgrub2-1:2.02-0.87.el7_9.2*
Red Hat Enterprise Linux 7.2 Advanced Update SupportRedHatgrub2-1:2.02-0.86.el7_2.2*
Red Hat Enterprise Linux 7.3 Advanced Update SupportRedHatgrub2-1:2.02-0.86.el7_3.2*
Red Hat Enterprise Linux 7.4 Advanced Update SupportRedHatgrub2-1:2.02-0.86.el7_4.2*
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportRedHatgrub2-1:2.02-0.86.el7_4.2*
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionsRedHatgrub2-1:2.02-0.86.el7_4.2*
Red Hat Enterprise Linux 7.6 Extended Update SupportRedHatgrub2-1:2.02-0.86.el7_6.3*
Red Hat Enterprise Linux 7.7 Extended Update SupportRedHatgrub2-1:2.02-0.86.el7_7.3*
Red Hat Enterprise Linux 8RedHatgrub2-1:2.02-90.el8_3.1*
Red Hat Enterprise Linux 8RedHatshim-0:15.4-2.el8_1*
Red Hat Enterprise Linux 8RedHatshim-unsigned-aarch64-0:15-7.el8_1*
Red Hat Enterprise Linux 8RedHatshim-unsigned-x64-0:15.4-4.el8_1*
Red Hat Enterprise Linux 8RedHatfwupd-0:1.5.9-1.el8_4*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatgrub2-1:2.02-87.el8_1.2*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatfwupd-0:1.1.4-4.el8_1*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatshim-0:15.4-2.el8_1*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatshim-unsigned-aarch64-0:15-7.el8_1*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHatshim-unsigned-x64-0:15.4-4.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatgrub2-1:2.02-87.el8_2.3*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatfwupd-0:1.1.4-9.el8_2*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatshim-0:15.4-2.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatshim-unsigned-aarch64-0:15-7.el8_1*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHatshim-unsigned-x64-0:15.4-4.el8_1*
Grub2Ubuntubionic*
Grub2Ubuntutrusty*
Grub2Ubuntuxenial*
Grub2-signedUbuntubionic*
Grub2-signedUbuntuesm-infra-legacy/trusty*
Grub2-signedUbuntuesm-infra/bionic*
Grub2-signedUbuntuesm-infra/focal*
Grub2-signedUbuntuesm-infra/xenial*
Grub2-signedUbuntufocal*
Grub2-signedUbuntugroovy*
Grub2-signedUbuntuhirsute*
Grub2-signedUbuntuimpish*
Grub2-signedUbuntutrusty*
Grub2-signedUbuntutrusty/esm*
Grub2-signedUbuntuxenial*
Grub2-unsignedUbuntubionic*
Grub2-unsignedUbuntuesm-infra/bionic*
Grub2-unsignedUbuntuesm-infra/focal*
Grub2-unsignedUbuntuesm-infra/xenial*
Grub2-unsignedUbuntufocal*
Grub2-unsignedUbuntugroovy*
Grub2-unsignedUbuntuhirsute*
Grub2-unsignedUbuntuimpish*
Grub2-unsignedUbuntuprecise/esm*
Grub2-unsignedUbuntutrusty*
Grub2-unsignedUbuntuxenial*

Potential Mitigations

References