Описание
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | does not affect Secure Boot |
esm-infra-legacy/trusty | not-affected | does not affect Secure Boot |
esm-infra/bionic | not-affected | does not affect Secure Boot |
esm-infra/focal | not-affected | does not affect Secure Boot |
esm-infra/xenial | not-affected | does not affect Secure Boot |
focal | not-affected | does not affect Secure Boot |
jammy | not-affected | does not affect Secure Boot |
kinetic | not-affected | does not affect Secure Boot |
lunar | not-affected | does not affect Secure Boot |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.167~18.04.5 |
devel | not-affected | 1.193 |
esm-infra-legacy/trusty | needed | |
esm-infra/bionic | not-affected | 1.167~18.04.5 |
esm-infra/focal | not-affected | 1.167.2 |
esm-infra/xenial | not-affected | 1.164 |
focal | released | 1.167.2 |
groovy | released | 1.167.2 |
hirsute | released | 1.164 |
impish | released | 1.169 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.04-1ubuntu44.1.2 |
devel | not-affected | 2.06-2ubuntu17 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 2.04-1ubuntu44.1.2 |
esm-infra/focal | not-affected | 2.04-1ubuntu44.2 |
esm-infra/xenial | not-affected | 2.04-1ubuntu42 |
focal | released | 2.04-1ubuntu44.2 |
groovy | released | 2.04-1ubuntu44.2 |
hirsute | released | 2.04-1ubuntu42 |
impish | released | 2.04-1ubuntu45 |
Показывать по
EPSS
6.9 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in grub2 in versions prior to 2.06. The cutmem comman ...
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
EPSS
6.9 Medium
CVSS2
7.5 High
CVSS3