Description
A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4867-1 | grub2 security update |
EUVD |
EUVD-2020-20253 | A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Ubuntu USN |
USN-4992-1 | GRUB 2 vulnerabilities |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Gnu
Subscribe
Grub2
Subscribe
Netapp
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T16:18:45.656Z
Reserved: 2020-10-27T00:00:00.000Z
Link: CVE-2020-27749
No data.
Status : Modified
Published: 2021-03-03T17:15:11.787
Modified: 2024-11-21T05:21:45.340
Link: CVE-2020-27749
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN