GNU GRUB2 could allow a local authenticated malicious user to execute arbitrary code on the system, caused by a "BootHole" vulnerability. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code within GRUB.
master 1 branch 0 tags Go to file Code Clone with HTTPS Use Git or checkout with SVN using the web URL. Download ZIP Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching GitHub Desktop If nothing happens, download GitHub Desktop and try again. Go back Launching Xcode If nothing happens, download Xcode and try again. Go back Launching Visual Studio If nothing happens, download the GitHub extension for Visual Studio and try again. Go back Latest commit wrffrz add link to grub patch series fixing these issues … e91124c 5 minutes ago add link to grub patch series fixing these issues e91124c Git stats 7 commits Files Permalink Failed to load latest commit information. Type Name Latest commit message Commit time Bash Initial Commit 1 hour ago Powershell Initial Commit 1 hour ago ADVISORIES.md add link to grub patch series fixing these issues 5 minutes ago LICENSE Initial commit 17 hours ago README.md Update README.md 1 hour ago View code README.md BootHole General information This repository was created to contain relevant helpful scripts and any additional tools or information that can assist others in managing their BootHole vulnerability mitigation plans. Windows Based Platforms We have created a Powershell script that will check the EFI System Partition for signed executable files that were revoked by Microsoft in the BootHole DBX Update Linux Based Platforms Similarly to the Windows Powershell script above, we have also created a Linux Bash script that will check for any signed executable files revoked in the BootHole DBX update . If you encounter any issues please report them and we will try our best to assist you as soon as we can. About This repository contains scripts , links and other related materials that may aid in detecting and mitigating the BootHole vulnerability (CVE-2020-10713) Resources Readme License GPL-3.0 License Releases No releases published Contributors 2 wrffrz wrffrz eclypsium eclypsium Languages Shell 63.5% PowerShell 36.5%
Billions of Windows and Linux devices are vulnerable to cyberattacks stemming from a bug in the GRUB2 bootloader, researchers are warning.
GRUB2 (which stands for the GRand Unified Bootloader version 2) is the default bootloader for the majority of computing systems. Its job is to manage part of the start-up process – it either presents a menu and awaits user input, or automatically transfers control to an operating system kernel.
Secure Boot is an industry standard that ensures th...
A severe vulnerability exists in almost all signed versions of GRUB2 bootloader used by most Linux systems. When properly exploited, it could allow threat actors to compromise an operating system’s booting process even if the Secure Boot verification mechanism is active.
Aptly named BootHole, the flaw permits executing arbitrary code in GRUB bootloader. An attacker could use it to plant malware known as bootkit that loads before the operating system (OS).
An annoying vulnerability in the widely used GRUB2 bootloader can be potentially exploited by malware or a rogue insider already on a machine to thoroughly compromise the operating system or hypervisor while evading detection by users and security tools.
This affects mainly Linux-based computers and devices, where GRUB2 is deployed a lot, though boxes running Windows can be potentially roped in, too. Any system on which GRUB2 can be installed and run at boot-time is potentially vulnerable....