|漏洞详情
gruM F w ~ ~ N Db2 2.04及之前版本中的‘grub_script_functio. E | , ` gn_create()’函数存在竞争条件问题漏i w d r p a o P洞。攻击者可利用该漏洞执行任意代码并绕过安全启动限制。
|参考资料
来源:DEBIAN
链接:https://w2 M U H ) & Xww.debian.org/security/2020/dsa-4735
来源:MLIST
链接:http://www.openwall.u b _ z 6 U /com/lists/oss-security/2M V : K { B020/07/29/3
来源:CONFIRM
链接:https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.h+ ( 3 E ! m O @tml
来源:CONFIRM
链接:https://www. i j ~eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
来源:REDHAT
链接:https://access.redhat.com/secM s { hurity/vulnerabili( q Dties/grub2bootlN : e - G / =oader
来源:CONFIRM
链接:https://www.openwall.com/lists/oss-security/2020/07/29/3
来源:UBUNTU
链接:ht` a h Ntps://wiki.ub8 / Kuntu.com/SecurityTev : & D }am/KnowledgeBase/GRUB2SecureBootBypass
来源:CONFIRM
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/af `dvisory/ADV200011
来源:DEBIAN
链接:https://www.debian.or T C v Jg/security/2020-GRUB-UEFI-SecureBoot
来源:UBUNT8 % ? ? 5 8 v YU
链接:http://ubuntu.com/security/notices/USN-4432-1
来h ~ D Q J p源:SUSE
链接:https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
来源:SUSE
链接:https://www.su| d ) / fse.com/support/kb/doc/?id=000019673
来源:nvd.nist.gov
链接:https://nvd.nist.gov^ P K T ; e B ;/vuln/deg . Y H 8tail/CVE-2020-15706
来源:access.red