QID 198410
Date Published: 2021-06-28
QID 198410: Ubuntu Security Notification for GRUB 2 vulnerabilities (USN-4992-1)
The acpi command in grub 2 allowed privileged users to load crafted acpi tables when secure boot is enabled.
The rmmod command in grub 2 contained a use- after-free vulnerability.
A buffer overflow existed in the command line parser in grub 2.the cutmem command in grub 2 did not honor secure boot locking.
The option parser in grub 2 contained a heap overflow vulnerability.
The menu rendering implementation in grub 2 did not properly calculate the amount of memory needed in some situations, leading to out-of-bounds writes.
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
an attacker could use this to bypass uefi secure boot restrictions. (
cve-2020-14372).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-25632).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-27749).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2020-27779).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2021-20225).
A local attacker could use this to execute arbitrary code and bypass uefi secure boot restrictions. (
cve-2021-20233).
- USN-4992-1 -
usn.ubuntu.com/4992-1
CVEs related to QID 198410
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| USN-4992-1 | Ubuntu Linux |
|