Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-15707

Опубликовано: 29 июл. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 5.7

Описание

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

РелизСтатусПримечание
bionic

released

2.02-2ubuntu8.16
devel

not-affected

2.06-2ubuntu18
esm-infra-legacy/trusty

not-affected

2.02~beta2-9ubuntu1.20
esm-infra/bionic

not-affected

2.02-2ubuntu8.16
esm-infra/focal

not-affected

2.04-1ubuntu26.1
esm-infra/xenial

not-affected

2.02~beta2-36ubuntu3.26
focal

released

2.04-1ubuntu26.1
groovy

not-affected

2.04-1ubuntu26.1
hirsute

not-affected

2.04-1ubuntu26.1
jammy

not-affected

2.06-2ubuntu7

Показывать по

РелизСтатусПримечание
bionic

released

1.93.18
devel

not-affected

1.193
esm-infra-legacy/trusty

not-affected

1.34.22
esm-infra/bionic

not-affected

1.93.18
esm-infra/focal

not-affected

1.142.3
esm-infra/xenial

not-affected

1.66.26
focal

released

1.142.3
groovy

not-affected

1.147
hirsute

not-affected

1.147
jammy

not-affected

1.180

Показывать по

РелизСтатусПримечание
bionic

not-affected

2.04-1ubuntu47.4
devel

not-affected

2.06-2ubuntu17
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

2.04-1ubuntu47.4
esm-infra/focal

not-affected

2.04-1ubuntu47.4
esm-infra/xenial

needed

focal

not-affected

2.04-1ubuntu47.4
jammy

not-affected

2.06-2ubuntu10
kinetic

not-affected

2.06-2ubuntu12
lunar

not-affected

2.06-2ubuntu16

Показывать по

EPSS

Процентиль: 8%
0.00033
Низкий

4.4 Medium

CVSS2

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
redhat
почти 5 лет назад

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

CVSS3: 5.7
nvd
почти 5 лет назад

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

CVSS3: 6.4
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5.7
debian
почти 5 лет назад

Integer overflows were discovered in the functions grub_cmd_initrd and ...

github
около 3 лет назад

Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

EPSS

Процентиль: 8%
0.00033
Низкий

4.4 Medium

CVSS2

5.7 Medium

CVSS3