Kernel and GRUB Security Update (MINDBREEZE15809)
ID: MINDBREEZE15809
Affected Components: Mindbreeze InSpire G7, Mindbreeze InSpire SaaS
Severity: 8.2 Moderate
Status: Final
First published: February 2, 2021
CVEs: CVE-2020-10713, CVE-2020-14308, CVE-2020-15705, CVE-2020-15706, CVE-2020-15707, CVE-2019-19527, CVE-2019-19537, CVE-2020-8647, CVE-2020-12826, CVE-2020-11565, CVE-2020-10732, CVE-2020-8695, CVE-2020-8696, CVE-2020-8698
Summary
The Kernel and GRUB Update contains fixes for the following CVEs:
- grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713)
- grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308)
- grub2: Integer overflow in initrd size handling (CVE-2020-15707)
- grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706)
- kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)
- kernel: race condition caused by a malicious USB device in the USB character device driver layer (CVE-2019-19537)
- kernel: out-of-bounds read in in vc_do_resize function in drivers/tty/vt/vt.c (CVE-2020-8647)
- kernel: possible to send arbitrary signals to a privileged (suidroot) parent process (CVE-2020-12826)
- kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c (CVE-2020-11565)
- kernel: uninitialized kernel data leak in userspace coredumps (CVE-2020-10732)
- hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
- hw: Vector Register Leakage-Active (CVE-2020-8696)
- hw: Fast forward store predictor (CVE-2020-8698)
Remediation
Hotfix Information
Fixed with following versions of Mindbreeze InSpire On-Premises or Mindbreeze InSpire SaaS:
- Mindbreeze InSpire 20.5 Release (Version 20.5.1.835)
- Mindbreeze InSpire SaaS 20.5 Release (Version 20.5.1.835)