Severity
6.7MEDIUM
EPSS
0.0%
top 86.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMay 24

Description

A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. Th

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages4 packages

NVDgnu/grub2< 2.06
Debiangrub2< 2.04-16+3
CVEListV5grub2grub 2.06

Also affects: Fedora 33, 34, Enterprise Linux 7.0, 8.0, 7.2, 7.3, 7.4, 7.6, 7.7, 8.2, 8.1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-258p-xh3c-g68w: A flaw was found in grub2 in versions prior to 22022-05-24
OSV
grub2-signed, grub2-unsigned vulnerabilities2021-06-18
CVEList
CVE-2020-27749: A flaw was found in grub2 in versions prior to 22021-03-03
OSV
CVE-2020-27749: A flaw was found in grub2 in versions prior to 22021-03-03

📋Vendor Advisories

4
Ubuntu
GRUB 2 vulnerabilities2021-06-18
Microsoft
A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents using a 1kB stack buffer for temporary 2021-03-09
Red Hat
grub2: Stack buffer overflow in grub_parser_split_cmdline()2021-03-02
Debian
CVE-2020-27749: grub2 - A flaw was found in grub2 in versions prior to 2.06. Variable names present are ...2020