Description
In grub2 versions before 2.06 the grub memory allocator doesn't check for
possible arithmetic overflows on the requested allocation size. This leads
the function to return invalid memory allocations which can be further used
to cause possible integrity, confidentiality and availability impacts
during the boot process.
Ubuntu-Description
It was discovered that the memory allocator for GRUB2 did not validate
allocation size, resulting in multiple integer overflows and heap-based
buffer overflows when handling certain filesystems, PNG images or disk
metadata. A local attacker could use this to execute arbitrary code and
bypass UEFI Secure Boot restrictions.
Notes
amurray | grub2-signed is not supported in Ubuntu 12.04 ESM (precise/esm) and so marking the priority for grub2 in this release as low |
Package
Upstream: | needs-triage
|
Ubuntu 18.04 LTS: | released
(2.02-2ubuntu8.16)
|
Ubuntu 20.04 LTS: | released
(2.04-1ubuntu26.1)
|
Ubuntu 16.04 ESM: | released
(2.02~beta2-36ubuntu3.26)
|
Ubuntu 14.04 ESM: | released
(2.02~beta2-9ubuntu1.20)
|
Patches:
Package
Upstream: | needs-triage
|
Ubuntu 18.04 LTS: | released
(1.93.18)
|
Ubuntu 20.04 LTS: | released
(1.142.3)
|
Ubuntu 16.04 ESM: | released
(1.66.26)
|
Ubuntu 14.04 ESM: | released
(1.34.22)
|
Patches:
Updated: 2022-04-13 14:09:02 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)