BootHole Blows Hole In GRUB2 Bootloader Security, Including UEFI SecureBoot

Written by Michael Larabel in Linux Security on 29 July 2020 at 03:00 PM EDT. 79 Comments
LINUX SECURITY
A major vulnerability in the GRUB2 boot-loader has been made public today that compromises its UEFI SecureBoot capabilities.

This vulnerability dubbed "BootHole" can allow for malicious code to be inserted into the system at early boot time via GRUB and can even be exploited on UEFI SecureBoot enabled systems.

Poor parsing within GRUB's configuration file parser could lead to a buffer overflow within GRUB2 that in turn could be used for executing malicious commands. BootHole can allow for bootkits to be installed onto the system among other nefarious efforts.

All major Linux distributions and any other users of the GRUB2 boot-loader will need to be patched.

More details on BootHole via Eclypsium who discovered this vulnerability.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week