Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-39950
HistoryAug 14, 2023 - 12:00 a.m.

CVE-2023-39950

2023-08-1400:00:00
ubuntu.com
ubuntu.com
9
efibootguard
uefi
bootloader
vulnerability
validation
code injections
crashes
libebgenv
environment files
sanitization
efi boot guard
patch
user variables

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L

EPSS

0.001

Percentile

24.2%

efibootguard is a simple UEFI boot loader with support for safely switching
between current and updated partition sets. Insufficient or missing
validation and sanitization of input from untrustworthy bootloader
environment files can cause crashes and probably also code injections into
bg_setenv) or programs using libebgenv. This is triggered when the
affected components try to modify a manipulated environment, in particular
its user variables. Furthermore, bg_printenv may crash over invalid read
accesses or report invalid results. Not affected by this issue is EFI Boot
Guard’s bootloader EFI binary. EFI Boot Guard release v0.15 contains
required patches to sanitize and validate the bootloader environment prior
to processing it in userspace. Its library and tools should be updated, so
should programs statically linked against it. An update of the bootloader
EFI executable is not required. The only way to prevent the issue with an
unpatched EFI Boot Guard version is to avoid accesses to user variables,
specifically modifications to them.

OSVersionArchitecturePackageVersionFilename
ubuntu24.04noarchefibootguard< anyUNKNOWN

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L

EPSS

0.001

Percentile

24.2%

Related for UB:CVE-2023-39950