Unrated severityNVD Advisory· Published Jul 15, 2020· Updated Aug 5, 2024
CVE-2019-20908
CVE-2019-20908
Description
An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
Affected products
94- Linux/Linux kerneldescription
- osv-coords93 versionspkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/kernel-vanilla&distro=openSUSE%20Leap%2015.1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP1_Update_13&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP1pkg:rpm/suse/kernel-livepatch-SLE15_Update_19&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP1pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP1pkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP4_Update_15&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP4pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-lp151.28.59.1+ 92 more
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-lp151.28.59.1
- (no CPE)range: < 4.12.14-8.38.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-1.3.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-10.13.1
- (no CPE)range: < 4.12.14-14.28.1
- (no CPE)range: < 4.12.14-10.13.1
- (no CPE)range: < 4.12.14-14.28.1
- (no CPE)range: < 4.12.14-8.38.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-10.13.1
- (no CPE)range: < 4.12.14-14.28.1
- (no CPE)range: < 4.12.14-8.38.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-16.22.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-122.29.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-95.57.1
- (no CPE)range: < 4.12.14-10.13.1
- (no CPE)range: < 4.12.14-14.28.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 4.12.14-197.48.1
- (no CPE)range: < 4.12.14-150.55.1
- (no CPE)range: < 1-6.3.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.htmlmitrevendor-advisoryx_refsource_SUSE
- usn.ubuntu.com/4426-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4427-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4439-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/4440-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.openwall.com/lists/oss-security/2020/07/20/6mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2020/07/29/3mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2020/07/30/2mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2020/07/30/3mitremailing-listx_refsource_MLIST
- cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4mitrex_refsource_MISC
- git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.shmitrex_refsource_MISC
- mailarchives.bentasker.co.uk/Mirrors/OSSSec/2020/06-Jun/msg00035.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.