Description
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
Published: 2020-07-29
Score: 5.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4735-1 grub2 security update
EUVD EUVD EUVD-2020-7693 Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
Ubuntu USN Ubuntu USN USN-4432-1 GRUB 2 vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Gnu Grub2
Microsoft Windows 10 Windows 8.1 Windows Rt 8.1 Windows Server 2012 Windows Server 2016 Windows Server 2019
Netapp Active Iq Unified Manager
Opensuse Leap
Redhat Enterprise Linux Enterprise Linux Atomic Host Openshift Container Platform Rhel Aus Rhel E4s Rhel Eus Rhel Tus
Suse Suse Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-17T03:07:49.301Z

Reserved: 2020-07-14T00:00:00.000Z

Link: CVE-2020-15707

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-29T18:15:14.640

Modified: 2024-11-21T05:06:04.027

Link: CVE-2020-15707

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-07-29T17:00:00Z

Links: CVE-2020-15707 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses