fwupdate-12-6.0.1.el7.AXS7

エラータID: AXSA:2020-255:01

Release date: 
Tuesday, August 4, 2020 - 13:07
Subject: 
fwupdate-12-6.0.1.el7.AXS7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.

The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.

The fwupdate packages provide a service that allows session software to update device firmware.

Security Fix(es):

* grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713)

* grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308)

* grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309)

* grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310)

* grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311)

* grub2: Fail kernel validation without shim protocol (CVE-2020-15705)

* grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706)

* grub2: Integer overflow in initrd size handling (CVE-2020-15707)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* grub2 doesn't handle relative paths correctly for UEFI HTTP Boot

* UEFI HTTP boot over IPv6 does not work

Users of grub2 are advised to upgrade to these updated packages, which fix these bugs.

CVE-2020-10713
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14308
In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
CVE-2020-14309
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14310
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-14311
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
CVE-2020-15705
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
CVE-2020-15706
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
CVE-2020-15707
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. fwupdate-12-6.0.1.el7.AXS7.src.rpm
    MD5: 9fdc5e501c4bcd52f7e753d29fde201f
    SHA-256: 9dfc108b774a9073a9137921998dfb0f376eea6ca460c77ce9986cc7a914970f
    Size: 64.70 kB

Asianux Server 7 for x86_64
  1. fwupdate-12-6.0.1.el7.AXS7.x86_64.rpm
    MD5: 66f2fbb9b67d6cc425381084e463ec1b
    SHA-256: c458c76261dce68266354ef59f45c8ffe297e623d9dc7ce644481bb6cc53d943
    Size: 21.88 kB
  2. fwupdate-efi-12-6.0.1.el7.AXS7.x86_64.rpm
    MD5: 28ee2d71e92ede1c8f19d9804168e7ce
    SHA-256: 2025ee177efd9c2f941dc30f3969ac52c2f2bdd1915450556e52601aa88a07ee
    Size: 55.85 kB
  3. fwupdate-libs-12-6.0.1.el7.AXS7.x86_64.rpm
    MD5: 4f15148e7582bb031e5f5d7ab47ae80c
    SHA-256: d78605241b98d7fcdc411201547a70dfa03010c4a02589ff9e5b60f67117cb7f
    Size: 26.63 kB