Release Date: | 2020-07-29 | |
Impact: | None | What is this? |
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
See more information about CVE-2020-15705 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 6.4 |
Vector String: | CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
Version: | 3.0 |
Attack Vector: | Local |
Attack Complexity: | High |
Privileges Required: | High |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality Impact: | High |
Integrity Impact: | High |
Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 7 (grub2) | ELSA-2020-5782 | 2020-07-29 |
Oracle Linux version 7 (grub2) | ELSA-2020-5790 | 2020-07-29 |
Oracle Linux version 8 (grub2) | ELSA-2020-5786 | 2020-07-29 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: