First published: Mon Jun 29 2020(Updated: )
A flaw was found in current grub2 versions as shipped with Red Hat Enterprise Linux 7 and 8, where the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This issue leads the function to return invalid memory allocations, causing heap-based overflows in several code paths. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/fwupdate | <0:12-6.el7_8 | 0:12-6.el7_8 |
redhat/grub2 | <1:2.02-0.86.el7_8 | 1:2.02-0.86.el7_8 |
redhat/shim | <0:15-7.el7_9 | 0:15-7.el7_9 |
redhat/shim-signed | <0:15-7.el7_8 | 0:15-7.el7_8 |
redhat/grub2 | <1:2.02-0.86.el7_2 | 1:2.02-0.86.el7_2 |
redhat/shim | <0:15-8.el7 | 0:15-8.el7 |
redhat/shim-signed | <0:15-8.el7_2 | 0:15-8.el7_2 |
redhat/grub2 | <1:2.02-0.86.el7 | 1:2.02-0.86.el7 |
redhat/shim-signed | <0:15-8.el7_3 | 0:15-8.el7_3 |
redhat/fwupdate | <0:9-10.el7_4 | 0:9-10.el7_4 |
redhat/grub2 | <1:2.02-0.86.el7_4 | 1:2.02-0.86.el7_4 |
redhat/shim-signed | <0:15-8.el7_4 | 0:15-8.el7_4 |
redhat/fwupdate | <0:12-6.el7_6 | 0:12-6.el7_6 |
redhat/grub2 | <1:2.02-0.86.el7_6 | 1:2.02-0.86.el7_6 |
redhat/shim-signed | <0:15-8.el7_6 | 0:15-8.el7_6 |
redhat/fwupdate | <0:12-6.el7_7 | 0:12-6.el7_7 |
redhat/grub2 | <1:2.02-0.86.el7_7 | 1:2.02-0.86.el7_7 |
redhat/shim-signed | <0:15-8.el7_7 | 0:15-8.el7_7 |
redhat/fwupd | <0:1.1.4-7.el8_2 | 0:1.1.4-7.el8_2 |
redhat/grub2 | <1:2.02-87.el8_2 | 1:2.02-87.el8_2 |
redhat/shim | <0:15-14.el8_2 | 0:15-14.el8_2 |
redhat/shim-unsigned-x64 | <0:15-7.el8 | 0:15-7.el8 |
redhat/fwupd | <0:1.1.4-2.el8_0 | 0:1.1.4-2.el8_0 |
redhat/grub2 | <1:2.02-87.el8_0 | 1:2.02-87.el8_0 |
redhat/shim | <0:15-14.el8_0 | 0:15-14.el8_0 |
redhat/fwupd | <0:1.1.4-2.el8_1 | 0:1.1.4-2.el8_1 |
redhat/grub2 | <1:2.02-87.el8_1 | 1:2.02-87.el8_1 |
redhat/shim | <0:15-14.el8_1 | 0:15-14.el8_1 |
Gnu Grub2 | <2.06 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
redhat/grub | <2.06 | 2.06 |
debian/grub2 | 2.06-3~deb11u6 2.06-13+deb12u1 2.12-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2020-14308 is a vulnerability in grub2, the GRand Unified Bootloader, which allows for heap-based overflow due to a flaw in the memory allocator.
CVE-2020-14308 affects Red Hat Enterprise Linux 7 and 8, as it is present in the shipped versions of grub2.
CVE-2020-14308 has a severity level of medium with a CVSS score of 6.4.
To fix CVE-2020-14308, you need to update grub2 to version 2.06 or higher.
You can find more information about CVE-2020-14308 on the Red Hat Security Advisory and CVE websites.