Security Vulnerabilities fixed in grub2 RHSA-2021:0696

description-logoDescription

The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) grub2: Use-after-free in rmmod command (CVE-2020-25632) grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) grub2: Use-after-free in rmmod command (CVE-2020-25632) grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

affected-products-logoAffected Applications

grub2