CVE-2020-15705
- EPSS 0.03%
- Published 29.07.2020 18:15:14
- Last modified 21.11.2024 05:06:03
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB imag...
CVE-2020-15706
- EPSS 0.06%
- Published 29.07.2020 18:15:14
- Last modified 21.11.2024 05:06:03
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure b...
CVE-2020-15707
- EPSS 0.04%
- Published 29.07.2020 18:15:14
- Last modified 21.11.2024 05:06:04
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffe...
CVE-2019-11477
- EPSS 71.15%
- Published 19.06.2019 00:15:12
- Last modified 21.11.2024 04:21:09
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This ha...
CVE-2019-11478
- EPSS 31.33%
- Published 19.06.2019 00:15:12
- Last modified 21.11.2024 04:21:09
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denia...