Description
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4735-1 | grub2 security update |
EUVD |
EUVD-2020-7693 | Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions. |
Ubuntu USN |
USN-4432-1 | GRUB 2 vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Gnu
Subscribe
Grub2
Subscribe
Microsoft
Subscribe
Windows 10
Subscribe
Windows 8.1
Subscribe
Windows Rt 8.1
Subscribe
Windows Server 2012
Subscribe
Windows Server 2016
Subscribe
Windows Server 2019
Subscribe
Netapp
Subscribe
Active Iq Unified Manager
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Atomic Host
Subscribe
Openshift Container Platform
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Suse
Subscribe
Suse Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T03:07:49.301Z
Reserved: 2020-07-14T00:00:00.000Z
Link: CVE-2020-15707
No data.
Status : Modified
Published: 2020-07-29T18:15:14.640
Modified: 2024-11-21T05:06:04.027
Link: CVE-2020-15707
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN