CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
48.1%
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
[
{
"product": "grub2 in Ubuntu",
"vendor": "Ubuntu",
"versions": [
{
"lessThan": "2.04-1ubuntu26.1",
"status": "affected",
"version": "20.04 LTS",
"versionType": "custom"
},
{
"lessThan": "2.02-2ubuntu8.16",
"status": "affected",
"version": "18.04 LTS",
"versionType": "custom"
},
{
"lessThan": "2.02~beta2-36ubuntu3.26",
"status": "affected",
"version": "16.04 LTS",
"versionType": "custom"
},
{
"lessThan": "2.02~beta2-9ubuntu1.20",
"status": "affected",
"version": "14.04 ESM",
"versionType": "custom"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
ubuntu.com/security/notices/USN-4432-1
www.openwall.com/lists/oss-security/2020/07/29/3
access.redhat.com/security/vulnerabilities/grub2bootloader
lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
security.gentoo.org/glsa/202104-05
security.netapp.com/advisory/ntap-20200731-0008/
usn.ubuntu.com/4432-1/
wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
www.debian.org/security/2020-GRUB-UEFI-SecureBoot
www.debian.org/security/2020/dsa-4735
www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
www.openwall.com/lists/oss-security/2020/07/29/3
www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
www.suse.com/support/kb/doc/?id=000019673
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
48.1%