Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2020-AVI-477
Vulnerability from certfr_avis
GRUB2 est le bootloader le plus couramment utilisé par les distributions Linux pour démarrer le système d'exploitation.
De multiples vulnérabilités ont été découvertes dans GRUB2. Elles permettent à un attaquant, ayant la possibilité de modifier le fichier de configuration grub.cfg ou de manipuler d'autres ressources utilisées par GRUB2, de provoquer une exécution de code arbitraire.
Pour y parvenir, l'attaquant doit avoir les droits administrateurs ou avoir un accès physique à un équipement afin de manipuler la séquence de démarrage (via un support amovible ou via la modification du disque de boot de la machine). Ces méthodes permettent donc de compromettre une machine même si celle-ci n'a pas Linux d'installé à l'origine.
En agissant ainsi sur une machine configurée avec Secure Boot, l'attaquant est alors en capacité de rompre la chaîne de confiance et de déployer du code malveillant pour compromettre la machine de façon persistante sans être détecté.
Solution
Les machines utilisant GRUB2 doivent appliquer les mises à jour publiées par les éditeurs de distribution Linux.
Afin de rétablir la chaîne de confiance Secure Boot, toutes les machines configurées avec Secure Boot devront être mises à jour pour interdire l'utilisation des versions GRUB2 vulnérables. Cette étape consiste à actualiser les fichiers DB et DBX qui référencent respectivement les bootloaders de confiance et les bootloaders révoqués par Secure Boot :
- soit en appliquant les mesures préconisées par Microsoft pour les machines installées avec un système d'exploitation Windows
- soit en appliquant les mesures préconisées par l'éditeur de la distribution Linux lorsque celui propose une mise à jour de Secure Boot
- soit en appliquant une mise à jour de BIOS publiée par le constructeur de l'équipement
Cette mise à jour de DBX doit donc être réalisée après avoir mis à jour GRUB2 sur les machines pour ne pas risque un blocage au moment du démarrage.
Le CERT-FR recommande donc fortement de se référer aux différentes publications des éditeurs disponibles à ce jour (cf. références documentaires) afin de déterminer le plan d'actions adapté à chaque configuration.
NoneTitle | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Toute machine configur\u00e9e avec Secure Boot pour s\u00e9curiser la s\u00e9quence de d\u00e9marrage de son syst\u00e8me d\u0027exploitation", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nLes machines utilisant GRUB2 doivent appliquer les mises \u00e0 jour publi\u00e9es\npar les \u00e9diteurs de distribution Linux.\n\nAfin de r\u00e9tablir la cha\u00eene de confiance Secure Boot, toutes les machines\nconfigur\u00e9es avec Secure Boot devront \u00eatre mises \u00e0 jour pour interdire\nl\u0027utilisation des versions GRUB2 vuln\u00e9rables. Cette \u00e9tape consiste \u00e0\nactualiser les fichiers DB et DBX qui r\u00e9f\u00e9rencent respectivement les\nbootloaders de confiance et les bootloaders r\u00e9voqu\u00e9s par Secure Boot :\n\n- soit en appliquant les mesures pr\u00e9conis\u00e9es par Microsoft pour les\n machines install\u00e9es avec un syst\u00e8me d\u0027exploitation Windows\n- soit en appliquant les mesures pr\u00e9conis\u00e9es par l\u0027\u00e9diteur de la\n distribution Linux lorsque celui propose une mise \u00e0 jour de Secure\n Boot\n- soit en appliquant une mise \u00e0 jour de BIOS publi\u00e9e par le\n constructeur de l\u0027\u00e9quipement\n\nCette mise \u00e0 jour de DBX doit donc \u00eatre r\u00e9alis\u00e9e apr\u00e8s avoir mis \u00e0 jour\nGRUB2 sur les machines pour ne pas risque un blocage au moment du\nd\u00e9marrage.\n\n**Le CERT-FR recommande donc fortement de se r\u00e9f\u00e9rer aux diff\u00e9rentes\npublications des \u00e9diteurs disponibles \u00e0 ce jour (cf. r\u00e9f\u00e9rences\ndocumentaires) afin de d\u00e9terminer le plan d\u0027actions adapt\u00e9 \u00e0 chaque\nconfiguration.**\n\n\u00a0\n", "cves": [ { "name": "CVE-2020-15707", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15707" }, { "name": "CVE-2020-14311", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14311" }, { "name": "CVE-2020-14310", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14310" }, { "name": "CVE-2020-14308", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14308" }, { "name": "CVE-2020-10713", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10713" }, { "name": "CVE-2020-15706", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15706" }, { "name": "CVE-2020-15705", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15705" }, { "name": "CVE-2020-14309", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14309" } ], "initial_release_date": "2020-07-30T00:00:00", "last_revision_date": "2020-07-31T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-477", "revisions": [ { "description": "Version initiale", "revision_date": "2020-07-30T00:00:00.000000" }, { "description": "ajout d\u0027un lien vers l\u0027avis Microsoft", "revision_date": "2020-07-31T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" } ], "summary": "GRUB2 est le bootloader le plus couramment utilis\u00e9 par les distributions\nLinux pour d\u00e9marrer le syst\u00e8me d\u0027exploitation.\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans GRUB2. Elles\npermettent \u00e0 un attaquant, ayant la possibilit\u00e9 de modifier le fichier\nde configuration grub.cfg ou de manipuler d\u0027autres ressources utilis\u00e9es\npar GRUB2, de provoquer une ex\u00e9cution de code arbitraire.\n\nPour y parvenir, l\u0027attaquant doit avoir les droits administrateurs ou\navoir un acc\u00e8s physique \u00e0 un \u00e9quipement afin de manipuler la s\u00e9quence de\nd\u00e9marrage (via un support amovible ou via la modification du disque de\nboot de la machine). Ces m\u00e9thodes permettent donc de compromettre une\nmachine m\u00eame si celle-ci n\u0027a pas Linux d\u0027install\u00e9 \u00e0 l\u0027origine.\n\nEn agissant ainsi sur une machine configur\u00e9e avec Secure Boot,\nl\u0027attaquant est alors en capacit\u00e9 de rompre la cha\u00eene de confiance et de\nd\u00e9ployer du code malveillant pour compromettre la machine de fa\u00e7on\npersistante sans \u00eatre d\u00e9tect\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Grub2", "vendor_advisories": [ { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 HP du 27 juillet 2020", "url": "https://support.hp.com/us-en/document/c06707446" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 SUSE du 29 juillet 2020", "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 Microsoft du 29 juillet 2020", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "published_at": null, "title": "Publication de la soci\u00e9t\u00e9 Eclypsium du 29 juillet 2020", "url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 Debian du 30 juillet 2020", "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot/" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 VMware du 29 juillet 2020", "url": "https://kb.vmware.com/s/article/80181" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 HPE du 29 juillet 2020", "url": "https://techhub.hpe.com/eginfolib/securityalerts/Boot_Hole/boot_hole.html" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 Ubuntu du 30 juillet 2020", "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "published_at": null, "title": "Avis de s\u00e9curit\u00e9 Red Hat du 29 juillet 2020", "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" } ] }
CVE-2020-15706 (GCVE-0-2020-15706)
Vulnerability from cvelistv5
- CWE-362 - Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)
Vendor | Product | Version | ||
---|---|---|---|---|
Ubuntu | grub2 in Ubuntu |
Version: 20.04 LTS < 2.04-1ubuntu26.1 Version: 18.04 LTS < 2.02-2ubuntu8.16 Version: 16.04 LTS < 2.02~beta2-36ubuntu3.26 Version: 14.04 ESM < 2.02~beta2-9ubuntu1.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "grub2 in Ubuntu", "vendor": "Ubuntu", "versions": [ { "lessThan": "2.04-1ubuntu26.1", "status": "affected", "version": "20.04 LTS", "versionType": "custom" }, { "lessThan": "2.02-2ubuntu8.16", "status": "affected", "version": "18.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-36ubuntu3.26", "status": "affected", "version": "16.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-9ubuntu1.20", "status": "affected", "version": "14.04 ESM", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Chris Coulson" } ], "datePublic": "2020-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:08:01", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "source": { "advisory": "USN 4432-1", "discovery": "INTERNAL" }, "title": "GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2020-07-29T17:00:00.000Z", "ID": "CVE-2020-15706", "STATE": "PUBLIC", "TITLE": "GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "grub2 in Ubuntu", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "20.04 LTS", "version_value": "2.04-1ubuntu26.1" }, { "version_affected": "\u003c", "version_name": "18.04 LTS", "version_value": "2.02-2ubuntu8.16" }, { "version_affected": "\u003c", "version_name": "16.04 LTS", "version_value": "2.02~beta2-36ubuntu3.26" }, { "version_affected": "\u003c", "version_name": "14.04 ESM", "version_value": "2.02~beta2-9ubuntu1.20" } ] } } ] }, "vendor_name": "Ubuntu" } ] } }, "credit": [ { "lang": "eng", "value": "Chris Coulson" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/", "refsource": "CONFIRM", "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "name": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass", "refsource": "UBUNTU", "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "name": "http://ubuntu.com/security/notices/USN-4432-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "name": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "name": "https://access.redhat.com/security/vulnerabilities/grub2bootloader", "refsource": "REDHAT", "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "name": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/", "refsource": "SUSE", "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "name": "https://www.suse.com/support/kb/doc/?id=000019673", "refsource": "SUSE", "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "name": "https://www.openwall.com/lists/oss-security/2020/07/29/3", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html", "refsource": "CONFIRM", "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" } ] }, "source": { "advisory": "USN 4432-1", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2020-15706", "datePublished": "2020-07-29T17:45:33.975497Z", "dateReserved": "2020-07-14T00:00:00", "dateUpdated": "2024-09-16T22:20:56.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15707 (GCVE-0-2020-15707)
Vulnerability from cvelistv5
- CWE-362 - Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Ubuntu | grub2 in Ubuntu |
Version: 20.04 LTS < 2.04-1ubuntu26.1 Version: 18.04 LTS < 2.02-2ubuntu8.16 Version: 16.04 LTS < 2.02~beta2-36ubuntu3.26 Version: 14.04 ESM < 2.02~beta2-9ubuntu1.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "grub2 in Ubuntu", "vendor": "Ubuntu", "versions": [ { "lessThan": "2.04-1ubuntu26.1", "status": "affected", "version": "20.04 LTS", "versionType": "custom" }, { "lessThan": "2.02-2ubuntu8.16", "status": "affected", "version": "18.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-36ubuntu3.26", "status": "affected", "version": "16.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-9ubuntu1.20", "status": "affected", "version": "14.04 ESM", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Colin Watson" }, { "lang": "en", "value": "Chris Coulson" } ], "datePublic": "2020-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:08:05", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "source": { "advisory": "USN 4432-1", "discovery": "INTERNAL" }, "title": "GRUB2 contained integer overflows when handling the initrd command, leading to a heap-based buffer overflow.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2020-07-29T17:00:00.000Z", "ID": "CVE-2020-15707", "STATE": "PUBLIC", "TITLE": "GRUB2 contained integer overflows when handling the initrd command, leading to a heap-based buffer overflow." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "grub2 in Ubuntu", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "20.04 LTS", "version_value": "2.04-1ubuntu26.1" }, { "version_affected": "\u003c", "version_name": "18.04 LTS", "version_value": "2.02-2ubuntu8.16" }, { "version_affected": "\u003c", "version_name": "16.04 LTS", "version_value": "2.02~beta2-36ubuntu3.26" }, { "version_affected": "\u003c", "version_name": "14.04 ESM", "version_value": "2.02~beta2-9ubuntu1.20" } ] } } ] }, "vendor_name": "Ubuntu" } ] } }, "credit": [ { "lang": "eng", "value": "Colin Watson" }, { "lang": "eng", "value": "Chris Coulson" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/", "refsource": "CONFIRM", "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "name": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass", "refsource": "UBUNTU", "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "name": "http://ubuntu.com/security/notices/USN-4432-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "name": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "name": "https://access.redhat.com/security/vulnerabilities/grub2bootloader", "refsource": "REDHAT", "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "name": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/", "refsource": "SUSE", "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "name": "https://www.suse.com/support/kb/doc/?id=000019673", "refsource": "SUSE", "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "name": "https://www.openwall.com/lists/oss-security/2020/07/29/3", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html", "refsource": "CONFIRM", "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "DSA-4735", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" } ] }, "source": { "advisory": "USN 4432-1", "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2020-15707", "datePublished": "2020-07-29T17:45:34.577890Z", "dateReserved": "2020-07-14T00:00:00", "dateUpdated": "2024-09-17T03:07:49.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14310 (GCVE-0-2020-14310)
Vulnerability from cvelistv5
URL | Tags | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
The Grub2 Project | grub2 |
Version: 2.06 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.404Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "grub2", "vendor": "The Grub2 Project", "versions": [ { "status": "affected", "version": "2.06" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn\u0027t verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:08:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14310", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "grub2", "version": { "version_data": [ { "version_value": "2.06" } ] } } ] }, "vendor_name": "The Grub2 Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn\u0027t verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] }, { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14310", "datePublished": "2020-07-31T20:55:55", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14311 (GCVE-0-2020-14311)
Vulnerability from cvelistv5
URL | Tags | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
The Grub2 Project | grub2 |
Version: 2.06 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "grub2", "vendor": "The Grub2 Project", "versions": [ { "status": "affected", "version": "2.06" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T11:06:35", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "grub2", "version": { "version_data": [ { "version_value": "2.06" } ] } } ] }, "vendor_name": "The Grub2 Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-190" } ] }, { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14311", "datePublished": "2020-07-31T20:56:30", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-10713 (GCVE-0-2020-10713)
Vulnerability from cvelistv5
- Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:14.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243" }, { "name": "VU#174059", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/174059" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.vmware.com/s/article/80181" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Grub", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All grub2 versions before 2.06" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:08:06", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-4735", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243" }, { "name": "VU#174059", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/174059" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://kb.vmware.com/s/article/80181" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10713", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Grub", "version": { "version_data": [ { "version_value": "All grub2 versions before 2.06" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4735", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4735" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243" }, { "name": "VU#174059", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/174059" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/", "refsource": "MISC", "url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "name": "https://kb.vmware.com/s/article/80181", "refsource": "MISC", "url": "https://kb.vmware.com/s/article/80181" }, { "name": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713", "refsource": "MISC", "url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10713", "datePublished": "2020-07-30T12:58:30", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:14:14.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14308 (GCVE-0-2020-14308)
Vulnerability from cvelistv5
- Integer Overflow or Wraparound leading to Heap-based Buffer Overflow
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852009" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Grub", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All grub2 versions before 2.06" } ] } ], "descriptions": [ { "lang": "en", "value": "In grub2 versions before 2.06 the grub memory allocator doesn\u0027t check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound leading to Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T11:06:24", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852009" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Grub", "version": { "version_data": [ { "version_value": "All grub2 versions before 2.06" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In grub2 versions before 2.06 the grub memory allocator doesn\u0027t check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound leading to Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1852009", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852009" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14308", "datePublished": "2020-07-29T19:03:41", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-15705 (GCVE-0-2020-15705)
Vulnerability from cvelistv5
- CWE-347 - Improper Verification of Cryptographic Signature
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Ubuntu | grub2 in Ubuntu |
Version: 20.04 LTS < 2.04-1ubuntu26.1 Version: 18.04 LTS < 2.02-2ubuntu8.16 Version: 16.04 LTS < 2.02~beta2-36ubuntu3.26 Version: 14.04 ESM < 2.02~beta2-9ubuntu1.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1280", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" }, { "name": "openSUSE-SU-2020:1282", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" }, { "name": "[oss-security] 20210302 Multiple GRUB2 vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/02/3" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "grub2 in Ubuntu", "vendor": "Ubuntu", "versions": [ { "lessThan": "2.04-1ubuntu26.1", "status": "affected", "version": "20.04 LTS", "versionType": "custom" }, { "lessThan": "2.02-2ubuntu8.16", "status": "affected", "version": "18.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-36ubuntu3.26", "status": "affected", "version": "16.04 LTS", "versionType": "custom" }, { "lessThan": "2.02~beta2-9ubuntu1.20", "status": "affected", "version": "14.04 ESM", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Mathieu Trudel-Lapierre" } ], "datePublic": "2020-07-29T00:00:00", "descriptions": [ { "lang": "en", "value": "GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347 Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T11:06:32", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1280", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" }, { "name": "openSUSE-SU-2020:1282", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" }, { "name": "[oss-security] 20210302 Multiple GRUB2 vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/03/02/3" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ], "source": { "advisory": "USN 4432-1", "defect": [ "https://launchpad.net/bugs/1801968" ], "discovery": "INTERNAL" }, "title": "GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2020-07-29T17:00:00.000Z", "ID": "CVE-2020-15705", "STATE": "PUBLIC", "TITLE": "GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "grub2 in Ubuntu", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "20.04 LTS", "version_value": "2.04-1ubuntu26.1" }, { "version_affected": "\u003c", "version_name": "18.04 LTS", "version_value": "2.02-2ubuntu8.16" }, { "version_affected": "\u003c", "version_name": "16.04 LTS", "version_value": "2.02~beta2-36ubuntu3.26" }, { "version_affected": "\u003c", "version_name": "14.04 ESM", "version_value": "2.02~beta2-9ubuntu1.20" } ] } } ] }, "vendor_name": "Ubuntu" } ] } }, "credit": [ { "lang": "eng", "value": "Mathieu Trudel-Lapierre" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347 Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/", "refsource": "CONFIRM", "url": "https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" }, { "name": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass", "refsource": "UBUNTU", "url": "https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass" }, { "name": "http://ubuntu.com/security/notices/USN-4432-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/security/notices/USN-4432-1" }, { "name": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011" }, { "name": "https://access.redhat.com/security/vulnerabilities/grub2bootloader", "refsource": "REDHAT", "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "name": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/", "refsource": "SUSE", "url": "https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" }, { "name": "https://www.suse.com/support/kb/doc/?id=000019673", "refsource": "SUSE", "url": "https://www.suse.com/support/kb/doc/?id=000019673" }, { "name": "https://www.openwall.com/lists/oss-security/2020/07/29/3", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html", "refsource": "CONFIRM", "url": "https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html" }, { "name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/29/3" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1280", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" }, { "name": "openSUSE-SU-2020:1282", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" }, { "name": "[oss-security] 20210302 Multiple GRUB2 vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/03/02/3" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" }, { "name": "[oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/2" }, { "name": "[oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/17/4" }, { "name": "[oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/09/21/1" } ] }, "source": { "advisory": "USN 4432-1", "defect": [ "https://launchpad.net/bugs/1801968" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2020-15705", "datePublished": "2020-07-29T17:45:33.422001Z", "dateReserved": "2020-07-14T00:00:00", "dateUpdated": "2024-09-17T00:06:01.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-14309 (GCVE-0-2020-14309)
Vulnerability from cvelistv5
- Integer Overflow or Wraparound leading to Heap-based Buffer Overflow
URL | Tags | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852022" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Grub", "vendor": "n/a", "versions": [ { "status": "affected", "version": "All grub2 versions before 2.06" } ] } ], "descriptions": [ { "lang": "en", "value": "There\u0027s an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow or Wraparound leading to Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-01T01:08:04", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852022" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202104-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-14309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Grub", "version": { "version_data": [ { "version_value": "All grub2 versions before 2.06" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There\u0027s an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound leading to Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1852022", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852022" }, { "name": "https://security.netapp.com/advisory/ntap-20200731-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200731-0008/" }, { "name": "USN-4432-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4432-1/" }, { "name": "openSUSE-SU-2020:1169", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" }, { "name": "openSUSE-SU-2020:1168", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" }, { "name": "GLSA-202104-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202104-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-14309", "datePublished": "2020-07-30T12:49:31", "dateReserved": "2020-06-17T00:00:00", "dateUpdated": "2024-08-04T12:39:36.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.