vulnerability
Oracle Linux: CVE-2020-14310: ELSA-2020-5786: grub2 security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:H/Au:M/C:N/I:C/A:C) | Jul 29, 2020 | Jul 30, 2020 | Dec 1, 2024 |
Severity
5
CVSS
(AV:L/AC:H/Au:M/C:N/I:C/A:C)
Published
Jul 29, 2020
Added
Jul 30, 2020
Modified
Dec 1, 2024
Description
There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
A flaw was found in grub2. An expected font value is not verified before proceeding with buffer allocations allowing an attacker to use a malicious font file to create an arithmetic overflow, zero-sized allocation, and further heap-based buffer overflow. The highest threat from this vulnerability is to data integrity and system availability.
A flaw was found in grub2. An expected font value is not verified before proceeding with buffer allocations allowing an attacker to use a malicious font file to create an arithmetic overflow, zero-sized allocation, and further heap-based buffer overflow. The highest threat from this vulnerability is to data integrity and system availability.
Solution(s)
oracle-linux-upgrade-grub2oracle-linux-upgrade-grub2-efi-aa64oracle-linux-upgrade-grub2-efi-aa64-cdbootoracle-linux-upgrade-grub2-toolsoracle-linux-upgrade-grub2-tools-extraoracle-linux-upgrade-grub2-tools-minimal

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.