Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-39950

Опубликовано: 14 авг. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.1

Описание

efibootguard is a simple UEFI boot loader with support for safely switching between current and updated partition sets. Insufficient or missing validation and sanitization of input from untrustworthy bootloader environment files can cause crashes and probably also code injections into bg_setenv) or programs using libebgenv. This is triggered when the affected components try to modify a manipulated environment, in particular its user variables. Furthermore, bg_printenv may crash over invalid read accesses or report invalid results. Not affected by this issue is EFI Boot Guard's bootloader EFI binary. EFI Boot Guard release v0.15 contains required patches to sanitize and validate the bootloader environment prior to processing it in userspace. Its library and tools should be updated, so should programs statically linked against it. An update of the bootloader EFI executable is not required. The only way to prevent the issue with an unpatched EFI Boot Guard version is to avoid acc...

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage
noble

needs-triage

oracular

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 21%
0.00067
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 2 лет назад

efibootguard is a simple UEFI boot loader with support for safely switching between current and updated partition sets. Insufficient or missing validation and sanitization of input from untrustworthy bootloader environment files can cause crashes and probably also code injections into `bg_setenv`) or programs using `libebgenv`. This is triggered when the affected components try to modify a manipulated environment, in particular its user variables. Furthermore, `bg_printenv` may crash over invalid read accesses or report invalid results. Not affected by this issue is EFI Boot Guard's bootloader EFI binary. EFI Boot Guard release v0.15 contains required patches to sanitize and validate the bootloader environment prior to processing it in userspace. Its library and tools should be updated, so should programs statically linked against it. An update of the bootloader EFI executable is not required. The only way to prevent the issue with an unpatched EFI Boot Guard version is to avoid access

CVSS3: 6.1
debian
больше 2 лет назад

efibootguard is a simple UEFI boot loader with support for safely swit ...

CVSS3: 5.9
fstec
больше 2 лет назад

Уязвимость функции bg_printenv UEFI-загрузчика EFI Boot Guard, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 21%
0.00067
Низкий

6.1 Medium

CVSS3