Bug 1153072 - (CVE-2019-14553) VUL-0: CVE-2019-14553: ovmf: edk2: invalid server certificate accepted in HTTPS-over-IPv6 boot
(CVE-2019-14553)
VUL-0: CVE-2019-14553: ovmf: edk2: invalid server certificate accepted in HTT...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/244186/
CVSSv3:SUSE:CVE-2019-14553:7.2:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-10-04 12:49 UTC by Marcus Meissner
Modified: 2020-05-13 13:15 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-10-04 12:49:55 UTC
rh#1758518

edk2 accepts invalid certificates in HTTPS-over-IPv6 boot, which would allow an attacker to perform a man-in-the-middle attack even when HTTPS is used. In particular, the Common Name (CN) of the certificate is not correctly checked, thus the boot succeeds even if it should not be performed.

Upstream issue:
https://bugzilla.tianocore.org/show_bug.cgi?id=960

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1758518
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-14553
Comment 1 Gary Ching-Pang Lin 2019-10-09 02:19:48 UTC
The patch set is still under discussion, so we probably have to wait for the final patches.
https://www.mail-archive.com/devel@edk2.groups.io/msg09643.html
Comment 2 Gary Ching-Pang Lin 2019-10-28 03:01:31 UTC
The v2 patch set was posted.

https://edk2.groups.io/g/devel/message/49462
Comment 3 Gary Ching-Pang Lin 2019-11-04 06:24:42 UTC
The patches are pushed into upstream git. Will start to backport them.
Comment 4 Gary Ching-Pang Lin 2019-11-04 09:43:29 UTC
It turned out that HTTPS Boot in SLE15/SLE15-SP1 and SLE12-SP4/SP5 isn't really enabled. The build parameter should be TLS_ENABLE instead of ENABLE_TLS, so only Tumbleweed is affected.
Comment 5 Gary Ching-Pang Lin 2019-12-05 03:30:37 UTC
The fix is already landed in openSUSE:Factory.
Comment 6 Wolfgang Frisch 2020-02-18 12:56:02 UTC
not affected
Comment 12 Gary Ching-Pang Lin 2020-02-26 02:42:32 UTC
The fix for SLE15, SLE12-SP3, and SLE12-SP4(SP5) is submitted.
Comment 13 Swamp Workflow Management 2020-03-03 14:20:29 UTC
SUSE-SU-2020:0568-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1153072,1163927,1163959,1163969
CVE References: CVE-2019-14553,CVE-2019-14559,CVE-2019-14563,CVE-2019-14575
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP1 (src):    ovmf-2017+git1510945757.b2662641d5-5.29.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Swamp Workflow Management 2020-03-08 20:11:13 UTC
openSUSE-SU-2020:0314-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1153072,1163927,1163959,1163969
CVE References: CVE-2019-14553,CVE-2019-14559,CVE-2019-14563,CVE-2019-14575
Sources used:
openSUSE Leap 15.1 (src):    ovmf-2017+git1510945757.b2662641d5-lp151.11.3.1
Comment 15 Swamp Workflow Management 2020-03-16 20:13:53 UTC
SUSE-SU-2020:0699-1: An update that fixes four vulnerabilities is now available.

Category: security (low)
Bug References: 1153072,1163927,1163959,1163969
CVE References: CVE-2019-14553,CVE-2019-14559,CVE-2019-14563,CVE-2019-14575
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    ovmf-2017+git1510945757.b2662641d5-3.23.1
SUSE Linux Enterprise Server 12-SP4 (src):    ovmf-2017+git1510945757.b2662641d5-3.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Alexandros Toptsoglou 2020-05-13 13:15:07 UTC
Done