Back to bug 1852009
Who | When | What | Removed | Added |
---|---|---|---|---|
Marco Benatto | 2020-06-29 15:23:25 UTC | CC | security-response-team | |
Guilherme de Almeida Suckevicz | 2020-06-29 16:16:39 UTC | Summary | EMBARGOED grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow | EMBARGOED CVE-2020-14308 grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow |
Alias | CVE-2020-14308 | |||
Marco Benatto | 2020-07-03 14:57:22 UTC | Depends On | 1853696, 1853699, 1853692, 1853688, 1853698, 1853693, 1853694, 1853691, 1853697, 1853695, 1853689, 1853690 | |
Marco Benatto | 2020-07-03 15:07:24 UTC | Doc Text | In current grub2 versions as shipped with Red Hat Enterprise Linux 7 and 8, the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process. | |
Marco Benatto | 2020-07-29 17:00:45 UTC | Group | security, qe_staff | |
CC | bootloader-eng-team, fmartine, lkundrak, pjones | |||
Deadline | 2020-07-29 | |||
Summary | EMBARGOED CVE-2020-14308 grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow | CVE-2020-14308 grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow | ||
Marco Benatto | 2020-07-29 18:18:03 UTC | Fixed In Version | grub 2.06 | |
errata-xmlrpc | 2020-07-29 18:30:39 UTC | Link ID | Red Hat Product Errata RHSA-2020:3216 | |
Product Security DevOps Team | 2020-07-29 19:27:46 UTC | Status | NEW | CLOSED |
Resolution | --- | ERRATA | ||
Last Closed | 2020-07-29 19:27:46 UTC | |||
errata-xmlrpc | 2020-07-29 19:34:02 UTC | Link ID | Red Hat Product Errata RHSA-2020:3217 | |
errata-xmlrpc | 2020-07-29 19:37:47 UTC | Link ID | Red Hat Product Errata RHSA-2020:3223 | |
errata-xmlrpc | 2020-07-29 20:14:44 UTC | Link ID | Red Hat Product Errata RHSA-2020:3227 | |
errata-xmlrpc | 2020-08-03 10:57:02 UTC | Link ID | Red Hat Product Errata RHSA-2020:3273 | |
errata-xmlrpc | 2020-08-03 11:14:00 UTC | Link ID | Red Hat Product Errata RHSA-2020:3275 | |
errata-xmlrpc | 2020-08-03 11:52:27 UTC | Link ID | Red Hat Product Errata RHSA-2020:3271 | |
errata-xmlrpc | 2020-08-03 12:02:21 UTC | Link ID | Red Hat Product Errata RHSA-2020:3276 | |
errata-xmlrpc | 2020-08-03 12:05:50 UTC | Link ID | Red Hat Product Errata RHSA-2020:3274 | |
Marco Benatto | 2020-08-03 13:45:19 UTC | Depends On | 1863017 | |
Marco Benatto | 2020-08-05 13:26:07 UTC | Comment | 4 | updated |
RaTasha Tillery-Smith | 2020-12-10 16:10:17 UTC | Doc Text | In current grub2 versions as shipped with Red Hat Enterprise Linux 7 and 8, the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process. | A flaw was found in current grub2 versions as shipped with Red Hat Enterprise Linux 7 and 8, where the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This issue leads the function to return invalid memory allocations, causing heap-based overflows in several code paths. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability. |
Back to bug 1852009