CVE-2020-15707 (CNNVD-202007-1720)
中文标题:
grub2 输入验证错误漏洞
英文标题:
GRUB2 contained integer overflows when handling the initrd command, leading to a heap-based buffer overflow.
漏洞描述
中文描述:
grub2是GNU社区的一款Linux系统引导程序。 GRUB2 2.04及之前版本中的efilinux组件的‘grub_cmd_initrd’和‘grub_initrd_init’函数存在输入验证错误漏洞。攻击者可利用该漏洞执行任意代码并绕过UEFI安全启动限制。
英文描述:
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Ubuntu | grub2 in Ubuntu | - | < 2.04-1ubuntu26.1 | - |
cpe:2.3:a:ubuntu:grub2_in_ubuntu:*:*:*:*:*:*:*:*
|
| gnu | grub2 | * | - | - |
cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_atomic_host | - | - | - |
cpe:2.3:a:redhat:enterprise_linux_atomic_host:-:*:*:*:*:*:*:*
|
| redhat | openshift_container_platform | 4.0 | - | - |
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux | 8.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
| microsoft | windows_10 | - | - | - |
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1607 | - | - |
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1809 | - | - |
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1903 | - | - |
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1909 | - | - |
cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 2004 | - | - |
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*
|
| microsoft | windows_8.1 | - | - | - |
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
|
| microsoft | windows_rt_8.1 | - | - | - |
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2012 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2012 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1903 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1909 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 2004 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*
|
| microsoft | windows_server_2019 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
|
| canonical | ubuntu_linux | 18.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 20.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| opensuse | leap | 15.2 | - | - |
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
|
| suse | suse_linux_enterprise_server | 11 | - | - |
cpe:2.3:o:suse:suse_linux_enterprise_server:11:*:*:*:*:*:*:*
|
| suse | suse_linux_enterprise_server | 12 | - | - |
cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
|
| suse | suse_linux_enterprise_server | 15 | - | - |
cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*
|
| netapp | active_iq_unified_manager | * | - | - |
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-15707 |
2025-11-11 15:20:25 | 2025-11-11 07:36:05 |
| NVD | nvd_CVE-2020-15707 |
2025-11-11 14:57:01 | 2025-11-11 07:44:32 |
| CNNVD | cnnvd_CNNVD-202007-1720 |
2025-11-11 15:10:28 | 2025-11-11 07:56:22 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-202007-1720
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 4 -> 34
- data_sources: ['cve'] -> ['cve', 'nvd']