Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14372

Опубликовано: 03 мар. 2021
Источник: ubuntu
Приоритет: medium
CVSS2: 6.2
CVSS3: 7.5

Описание

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

does not affect Secure Boot
esm-infra-legacy/trusty

not-affected

does not affect Secure Boot
esm-infra/bionic

not-affected

does not affect Secure Boot
esm-infra/focal

not-affected

does not affect Secure Boot
esm-infra/xenial

not-affected

does not affect Secure Boot
focal

not-affected

does not affect Secure Boot
jammy

not-affected

does not affect Secure Boot
kinetic

not-affected

does not affect Secure Boot
lunar

not-affected

does not affect Secure Boot

Показывать по

РелизСтатусПримечание
bionic

released

1.167~18.04.5
devel

not-affected

1.193
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

1.167~18.04.5
esm-infra/focal

not-affected

1.167.2
esm-infra/xenial

not-affected

1.164
focal

released

1.167.2
groovy

released

1.167.2
hirsute

released

1.164
impish

released

1.169

Показывать по

РелизСтатусПримечание
bionic

released

2.04-1ubuntu44.1.2
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.04-1ubuntu44.1.2
esm-infra/focal

not-affected

2.04-1ubuntu44.2
esm-infra/xenial

not-affected

2.04-1ubuntu42
focal

released

2.04-1ubuntu44.2
groovy

released

2.04-1ubuntu44.2
hirsute

released

2.04-1ubuntu42
impish

released

2.04-1ubuntu45

Показывать по

6.2 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

CVSS3: 7.5
nvd
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrec ...

CVSS3: 7.5
github
около 3 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

6.2 Medium

CVSS2

7.5 High

CVSS3