vulnerability
Oracle Linux: CVE-2020-14311: ELSA-2020-5782: grub2 security update (IMPORTANT) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:L/Au:N/C:N/I:P/A:P) | Jul 29, 2020 | Jul 30, 2020 | Dec 3, 2025 |
Severity
4
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:P)
Published
Jul 29, 2020
Added
Jul 30, 2020
Modified
Dec 3, 2025
Description
There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
A flaw was found in grub2 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow, leading to a zero-sized memory allocation with a subsequent heap-based buffer overflow. The highest threat from this vulnerability is to integrity and system availability.
A flaw was found in grub2 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow, leading to a zero-sized memory allocation with a subsequent heap-based buffer overflow. The highest threat from this vulnerability is to integrity and system availability.
Solutions
oracle-linux-upgrade-grub2oracle-linux-upgrade-grub2-commonoracle-linux-upgrade-grub2-efi-aa64oracle-linux-upgrade-grub2-efi-aa64-cdbootoracle-linux-upgrade-grub2-efi-aa64-modulesoracle-linux-upgrade-grub2-efi-ia32oracle-linux-upgrade-grub2-efi-ia32-cdbootoracle-linux-upgrade-grub2-efi-ia32-modulesoracle-linux-upgrade-grub2-efi-x64oracle-linux-upgrade-grub2-efi-x64-cdbootoracle-linux-upgrade-grub2-efi-x64-modulesoracle-linux-upgrade-grub2-pcoracle-linux-upgrade-grub2-pc-modulesoracle-linux-upgrade-grub2-toolsoracle-linux-upgrade-grub2-tools-efioracle-linux-upgrade-grub2-tools-extraoracle-linux-upgrade-grub2-tools-minimal
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.