Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-14309

Опубликовано: 30 июл. 2020
Источник: debian
EPSS Низкий

Описание

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
grub2fixed2.04-9package
grub2ignoredstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2020/07/29/3

  • https://git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=3f05d693d1274965ffbe4ba99080dc2c570944c6

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
почти 5 лет назад

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

CVSS3: 6.7
redhat
почти 5 лет назад

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

CVSS3: 6.7
nvd
почти 5 лет назад

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

CVSS3: 6.7
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 6.7
github
около 3 лет назад

There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.

EPSS

Процентиль: 14%
0.00047
Низкий