Description
 GRUB2 contains a race condition in grub_script_function_create() leading to
a use-after-free vulnerability which can be triggered by redefining a
function whilst the same function is already executing, leading to
arbitrary code execution and secure boot restriction bypass. This issue
affects GRUB2 version 2.04 and prior versions.
 
Ubuntu-Description
 Chris Coulson discovered that the GRUB2 function handling code did not
properly handle a function being redefined, leading to a use-after-free
vulnerability. A local attacker could use this to execute arbitrary code
and bypass UEFI Secure Boot restrictions.
 
Notes
| amurray | grub2-signed is not supported in Ubuntu 12.04 ESM (precise/esm) and so marking the priority for grub2 in this release as low | 
| sbeattie | 809f3a268 script: Avoid a use-after-free when redefining a function during execution | 
  
Package
| Upstream: | needs-triage
 | 
| Ubuntu 18.04 LTS: | released
(2.02-2ubuntu8.16)
 | 
| Ubuntu 20.04 LTS: | released
(2.04-1ubuntu26.1)
 | 
| Ubuntu 16.04 ESM: | released
(2.02~beta2-36ubuntu3.26)
 | 
| Ubuntu 14.04 ESM: | released
(2.02~beta2-9ubuntu1.20)
 | 
Patches:
 
Package
| Upstream: | needs-triage
 | 
| Ubuntu 18.04 LTS: | released
(1.93.18)
 | 
| Ubuntu 20.04 LTS: | released
(1.142.3)
 | 
| Ubuntu 16.04 ESM: | released
(1.66.26)
 | 
| Ubuntu 14.04 ESM: | released
(1.34.22)
 | 
Patches:
 
Updated: 2022-04-13 14:11:25 UTC  (commit f411bd370d482ef4385c4e751d121a4055fbc009)