CVE-2020-10759
Published: 9 June 2020
A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
Priority
Status
Package | Release | Status |
---|---|---|
fwupd Launchpad, Ubuntu, Debian |
bionic |
Released
(1.2.10-1ubuntu2~ubuntu18.04.5)
|
eoan |
Released
(1.2.10-1ubuntu4.1)
|
|
focal |
Released
(1.3.9-4ubuntu0.1)
|
|
groovy |
Released
(1.3.10-1)
|
|
hirsute |
Released
(1.3.10-1)
|
|
impish |
Released
(1.3.10-1)
|
|
jammy |
Released
(1.3.10-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(0.8.3-0ubuntu5.1)
|
|
Patches: upstream: https://github.com/fwupd/fwupd/commit/21f2d12fccef63b8aaa99ec53278ce18250b0444 |
||
libjcat Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
eoan |
Does not exist
|
|
focal |
Not vulnerable
(0.1.3-1)
|
|
groovy |
Not vulnerable
(0.1.3-1)
|
|
hirsute |
Not vulnerable
(0.1.3-1)
|
|
impish |
Not vulnerable
(0.1.3-1)
|
|
jammy |
Not vulnerable
(0.1.3-1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
Patches: upstream: https://github.com/hughsie/libjcat/commit/839b89f45a38b2373bf5836337a33f450aaab72e |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.0 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N |