edk2: CVE-2021-38576 CVE-2021-38577 CVE-2021-38578

Related Vulnerabilities: CVE-2021-38576   CVE-2021-38577   CVE-2021-38578  

Debian Bug report logs - #1014468
edk2: CVE-2021-38576 CVE-2021-38577 CVE-2021-38578

Reported by: Moritz Mühlenhoff <jmm@inutil.org>

Date: Wed, 6 Jul 2022 15:21:02 UTC

Severity: normal

Tags: security, upstream

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#1014468; Package src:edk2. (Wed, 06 Jul 2022 15:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Moritz Mühlenhoff <jmm@inutil.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>.

Your message specified a Severity: in the pseudo-header, but the severity value import was not recognised. The default severity normal is being used instead. The recognised values are: critical, grave, serious, important, normal, minor, wishlist, fixed.

(Wed, 06 Jul 2022 15:21:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Moritz Mühlenhoff <jmm@inutil.org>
To: submit@bugs.debian.org
Subject: edk2: CVE-2021-38576 CVE-2021-38577 CVE-2021-38578
Date: Wed, 6 Jul 2022 17:17:51 +0200
Source: edk2
X-Debbugs-CC: team@security.debian.org
Severity: import
Tags: security

Hi,

The following vulnerabilities were published for edk2.

The upstream bugs are still private at this point, though.

CVE-2021-38576[0]:
| A BIOS bug in firmware for a particular PC model leaves the Platform
| authorization value empty. This can be used to permanently brick the
| TPM in multiple ways, as well as to non-permanently DoS the system.

https://bugzilla.tianocore.org/show_bug.cgi?id=3387

CVE-2021-38577[1]:
| Heap Overflow in BaseBmpSupportLib.

https://bugzilla.tianocore.org/show_bug.cgi?id=3360

CVE-2021-38578[2]:
| Existing CommBuffer checks in SmmEntryPoint will not catch underflow
| when computing BufferSize.

https://bugzilla.tianocore.org/show_bug.cgi?id=3499 (private)

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-38576
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38576
[1] https://security-tracker.debian.org/tracker/CVE-2021-38577
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38577
[2] https://security-tracker.debian.org/tracker/CVE-2021-38578
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38578

Please adjust the affected versions in the BTS as needed.



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 06 Jul 2022 19:33:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Jul 7 13:15:13 2022; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.