漏洞信息详情
GRUB2 输入验证错误漏洞
漏洞简介
grub2是GNU社区的一款Linux系统引导程序。
GRUB2 2.04及之前版本中的efilinux组件的‘grub_cmd_initrd’和‘grub_initrd_init’函数存在输入验证错误漏洞。攻击者可利用该漏洞执行任意代码并绕过UEFI安全启动限制。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
参考网址
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200731-0008/
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4735
来源:CONFIRM
链接:https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
来源:DEBIAN
链接:https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
来源:UBUNTU
链接:http://ubuntu.com/security/notices/USN-4432-1
来源:GENTOO
链接:https://security.gentoo.org/glsa/202104-05
来源:securityadvisories.paloaltonetworks.com
链接:https://securityadvisories.paloaltonetworks.com/PAN-SA-2020-0008
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2020/07/29/3
来源:CONFIRM
链接:https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
来源:REDHAT
链接:https://access.redhat.com/security/vulnerabilities/grub2bootloader
来源:CONFIRM
链接:https://www.openwall.com/lists/oss-security/2020/07/29/3
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
来源:UBUNTU
链接:https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
来源:UBUNTU
链接:https://usn.ubuntu.com/4432-1/
来源:CONFIRM
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
来源:SUSE
链接:https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
来源:SUSE
链接:https://www.suse.com/support/kb/doc/?id=000019673
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/48920
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021050105
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2804.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2591/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/GRUB2-integer-overflow-via-Initrd-Size-Handling-32958
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2020-15707
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162414/Gentoo-Linux-Security-Advisory-202104-05.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2679/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-15707
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158669/Red-Hat-Security-Advisory-2020-3227-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2647/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158723/Red-Hat-Security-Advisory-2020-3274-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2616/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158765/Ubuntu-Security-Notice-USN-4432-2.html
受影响实体
暂无
补丁
- grub2 竞争条件问题漏洞的修复措施<!--2020-7-29-->
还没有评论,来说两句吧...