QID 198410

Date Published: 2021-06-28

QID 198410: Ubuntu Security Notification for GRUB 2 vulnerabilities (USN-4992-1)

The acpi command in grub 2 allowed privileged users to load crafted acpi tables when secure boot is enabled.
The rmmod command in grub 2 contained a use- after-free vulnerability.
A buffer overflow existed in the command line parser in grub 2.the cutmem command in grub 2 did not honor secure boot locking.
The option parser in grub 2 contained a heap overflow vulnerability.
The menu rendering implementation in grub 2 did not properly calculate the amount of memory needed in some situations, leading to out-of-bounds writes.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

an attacker could use this to bypass uefi secure boot restrictions. (
cve-2020-14372).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-25632).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-27749).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-27779).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2021-20225).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2021-20233).

  • CVSS V3 rated as Critical - 8.2 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Refer to Ubuntu advisory: USN-4992-1 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    USN-4992-1 Ubuntu Linux URL Logo usn.ubuntu.com/4992-1