Description
A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4867-1 | grub2 security update |
EUVD |
EUVD-2021-7672 | A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. |
Ubuntu USN |
USN-4992-1 | GRUB 2 vulnerabilities |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Gnu
Subscribe
Grub2
Subscribe
Netapp
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:37:22.631Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20233
No data.
Status : Modified
Published: 2021-03-03T17:15:12.037
Modified: 2024-11-21T05:46:10.990
Link: CVE-2021-20233
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN