Improper Verification of Cryptographic Signature Affecting grub2-powerpc-ieee1275 package, versions <2.04-9.15.1



    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High
Expand this section
6.4 medium
Expand this section
7.8 high
Expand this section
Red Hat
6.4 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-SLES152-GRUB2POWERPCIEEE1275-2705166
  • published 14 Apr 2022
  • disclosed 25 Aug 2020

How to fix?

Upgrade SLES:15.2 grub2-powerpc-ieee1275 to version 2.04-9.15.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2-powerpc-ieee1275 package and not the grub2-powerpc-ieee1275 package as distributed by SLES:15.2. See How to fix? for SLES:15.2 relevant fixed versions and status.

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.