Description
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4867-1 | grub2 security update |
EUVD |
EUVD-2020-20283 | A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Ubuntu USN |
USN-4992-1 | GRUB 2 vulnerabilities |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Gnu
Subscribe
Grub2
Subscribe
Netapp
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T16:25:42.468Z
Reserved: 2020-10-27T00:00:00.000Z
Link: CVE-2020-27779
No data.
Status : Modified
Published: 2021-03-03T17:15:11.847
Modified: 2024-11-21T05:21:49.190
Link: CVE-2020-27779
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN