Bug 1858038 (CVE-2019-14560) - CVE-2019-14560 edk2: Function GetEfiGlobalVariable2() return value not checked in DxeImageVerificationHandler()
Summary: CVE-2019-14560 edk2: Function GetEfiGlobalVariable2() return value not checke...
Keywords:
Status: NEW
Alias: CVE-2019-14560
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 1858039 1858040 1861743 1861744 1910520
Blocks: 1858041
TreeView+ depends on / blocked
 
Reported: 2020-07-16 20:59 UTC by Pedro Sampaio
Modified: 2024-03-19 17:30 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6330 0 None None None 2023-11-07 08:13:01 UTC
Red Hat Product Errata RHSA-2023:6919 0 None None None 2023-11-14 15:16:14 UTC
Red Hat Product Errata RHSA-2024:0408 0 None None None 2024-01-24 16:41:45 UTC
Red Hat Product Errata RHSA-2024:1415 0 None None None 2024-03-19 17:30:29 UTC
TianoCore 2167 0 None None None 2020-07-17 15:42:55 UTC

Description Pedro Sampaio 2020-07-16 20:59:41 UTC
A flaw was found in edk2. Function GetEfiGlobalVariable2() return value is not checked possibly leading to secure boot bypass if an attacker
can cause the API to fail.

References:

https://bugzilla.tianocore.org/show_bug.cgi?id=2167

Comment 1 Pedro Sampaio 2020-07-16 21:00:11 UTC
Created edk2 tracking bugs for this issue:

Affects: epel-all [bug 1858039]
Affects: fedora-all [bug 1858040]

Comment 4 Riccardo Schirone 2020-07-29 12:52:06 UTC
Proposed patch:
https://bugzilla.tianocore.org/attachment.cgi?id=405&action=diff

Comment 6 Riccardo Schirone 2020-07-29 13:12:56 UTC
In function DxeImageVerificationHandler() there is a call to GetEfiGlobalVariable2 (EFI_SECURE_BOOT_MODE_NAME, ...) but the return value is not checked. If an attacker is able to cause the API to fail it would allow him to bypass secure boot.

Comment 11 errata-xmlrpc 2023-11-07 08:12:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6330 https://access.redhat.com/errata/RHSA-2023:6330

Comment 12 errata-xmlrpc 2023-11-14 15:16:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:6919 https://access.redhat.com/errata/RHSA-2023:6919

Comment 14 errata-xmlrpc 2024-01-24 16:41:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0408 https://access.redhat.com/errata/RHSA-2024:0408

Comment 16 errata-xmlrpc 2024-03-19 17:30:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:1415 https://access.redhat.com/errata/RHSA-2024:1415


Note You need to log in before you can comment on or make changes to this bug.