Source: efibootguard
Version: 0.13-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for efibootguard.

CVE-2023-39950[0]:
| efibootguard is a simple UEFI boot loader with support for safely
| switching between current and updated partition sets. Insufficient
| or missing validation and sanitization of input from untrustworthy
| bootloader environment files can cause crashes and probably also
| code injections into `bg_setenv`) or programs using `libebgenv`.
| This is triggered when the affected components try to modify a
| manipulated environment, in particular its user variables.
| Furthermore, `bg_printenv` may crash over invalid read accesses or
| report invalid results. Not affected by this issue is EFI Boot
| Guard's bootloader EFI binary. EFI Boot Guard release v0.15 contains
| required patches to sanitize and validate the bootloader environment
| prior to processing it in userspace. Its library and tools should be
| updated, so should programs statically linked against it. An update
| of the bootloader EFI executable is not required. The only way to
| prevent the issue with an unpatched EFI Boot Guard version is to
| avoid accesses to user variables, specifically modifications to
| them.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-39950
    https://www.cve.org/CVERecord?id=CVE-2023-39950

Regards,
Salvatore

Reply via email to