shim-15-8.el7

エラータID: AXSA:2020-250:01

Release date: 
Monday, August 3, 2020 - 08:58
Subject: 
shim-15-8.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.

Security Fix(es):

* grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713)

* grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308)

* grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309)

* grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310)

* grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311)

* grub2: Fail kernel validation without shim protocol (CVE-2020-15705)

* grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706)

* grub2: Integer overflow in initrd size handling (CVE-2020-15707)
CVE-2020-10713
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14308
In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
CVE-2020-14309
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14310
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14311
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-15705
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
CVE-2020-15706
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

CVE-2020-15707
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. shim-signed-15-8.el7.src.rpm
    MD5: 9fb66d01127624325e3656e5627dc859
    SHA-256: 9fda12299ad03193cfa1f98a83ab11a9778364d6ad5a43f85f137ce802b975da
    Size: 1.13 MB
  2. shim-15-8.el7.src.rpm
    MD5: 479ff7072e67401b9639d41b278d068b
    SHA-256: e12e2141adca31b0e1b70f2db72a6e5b353f1ce0d4e30bf9506b89be9456eba0
    Size: 1.08 MB

Asianux Server 7 for x86_64
  1. mokutil-15-8.el7.x86_64.rpm
    MD5: 0c795b6643026d88011f5050181300d3
    SHA-256: 01d9ca366b62e79a2f512d2533d5f0f9f4c147320ed723016461bd586749c922
    Size: 41.09 kB
  2. shim-ia32-15-8.el7.x86_64.rpm
    MD5: e23f68150f965889773dc644918e83ee
    SHA-256: 6d243746714dff899490e8bbf4ce7df6f50959ab6c773d7b910d0d31b3b7737b
    Size: 617.62 kB
  3. shim-x64-15-8.el7.x86_64.rpm
    MD5: 041efbb4aa1d12bf25fc853a6473e917
    SHA-256: 7c3cadb43189927949d3f48f49b93b627bd720cabcea138aadf4da941b44e89e
    Size: 690.40 kB
  4. shim-unsigned-ia32-15-8.el7.x86_64.rpm
    MD5: 6ee19443d49bbe87b20ddd3ad40a7971
    SHA-256: cb8828a346292e2ddf564c774478e76a7ca62069b3e9ee1ba60bf72c9faf2b6b
    Size: 461.68 kB
  5. shim-unsigned-x64-15-8.el7.x86_64.rpm
    MD5: 48b6e851c9cf075397449ff947e5ff66
    SHA-256: 0b5dc055056672620c26596e2f5ceec7c2f178614bacd821299360c94af45694
    Size: 513.70 kB