CNNVD-ID编号 | CNNVD-202007-1737 |
CVE编号 | CVE-2020-14310 |
发布时间 | 2020-07-30 |
更新时间 | 2020-11-13 |
漏洞类型 | 输入验证错误 |
漏洞来源 | N/A |
危险等级 | 中危 |
威胁类型 | 本地 |
厂 商 | N/A |
grub2是GNU计划的一款Linux系统引导程序。
grub2 2.06之前版本中的‘read_section_as_string()’函数存在输入验证错误漏洞。该漏洞源于网络系统或产品未对输入的数据进行正确的验证。
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://www.gnu.org/
来源:securityadvisories.paloaltonetworks.com
链接:https://securityadvisories.paloaltonetworks.com/PAN-SA-2020-0008
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
来源:UBUNTU
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310
来源:www.nsfocus.net
来源:www.nsfocus.net
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.ibm.com
来源:www.auscert.org.au
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/GRUB2-integer-overflow-via-read-section-from-string-32954
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158669/Red-Hat-Security-Advisory-2020-3227-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158723/Red-Hat-Security-Advisory-2020-3274-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158765/Ubuntu-Security-Notice-USN-4432-2.html
来源:access.redhat.com
暂无