CVE-2020-14309
Published: August 31, 2023Last modified: August 31, 2023
Description
There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 6.7 | 
| Attack Vector | LOCAL | 
| Attack complexity | LOW | 
| Privileges required | HIGH | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | grub | Not affected (2.06-r15) | 
| Stream | grub | Not affected (2.06-r17) | 
References
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
 - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
 - https://bugzilla.redhat.com/show_bug.cgi?id=1852022
 - https://security.gentoo.org/glsa/202104-05
 - https://security.netapp.com/advisory/ntap-20200731-0008/
 - https://usn.ubuntu.com/4432-1/