| Summary: | Several vulnerabilities have been discovered in the GRUB2 bootloader.CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15706, CVE-2020-15707 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Olav Vitters <olav> |
| Component: | RPM Packages | Assignee: | Mageia Bug Squad <bugsquad> |
| Status: | RESOLVED DUPLICATE | QA Contact: | |
| Severity: | critical | ||
| Priority: | release_blocker | ||
| Version: | 7 | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot/ | ||
| Whiteboard: | |||
| Source RPM: | grub2 | CVE: | |
| Status comment: | |||
|
Description
Olav Vitters
2020-07-29 22:05:27 CEST
According to the URL, the EUFI key might get revoked. Could be that Microsoft pushes these, so in case of a dual boot the user will be affected. Revocation will result in an unbootable system, can be fixed by rescue media. Multiple packages need to be updated afterwards: - GRUB2 - Linux (kernel package) - Shim - Fwupdate - Fwupd Priority:
Normal =>
release_blocker We don't support Secure/Restricted boot, so CVE-2020-10713 (the one getting all the attention) is mostly irrelevant to us, and other distros' changes to kernel, shim, fwupdate, and fwupd are not relevant to us either. The kernel needs to be updated just in general for other reasons (Bug 27006). GRUB2 issues already filed in Bug 27018. *** This bug has been marked as a duplicate of bug 27018 *** Status:
NEW =>
RESOLVED |