Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/lf-edge/eve/pkg/grub
  4. ›
  5. GHSA-x9mp-jm4h-jjf8

GHSA-x9mp-jm4h-jjf8: Duplicate Advisory: EVE Doesn't Protect Rootfs

September 20, 2023 (updated February 4, 2026)

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-wc42-fcjp-v8vq. This link is maintained to preserve external references.

Original Description

In EVE OS, the “measured boot” mechanism prevents a compromised device from accessing the encrypted data located in the vault.

As per the “measured boot” design, the PCR values calculated at different stages of the boot process will change if any of their respective parts are changed.

This includes, among other things, the configuration of the bios, grub, the kernel cmdline, initrd, and more.

However, this mechanism does not validate the entire rootfs, so an attacker can edit the filesystem and gain control over the system.

As the default filesystem used by EVE OS is squashfs, this is somewhat harder than an ext4, which is easily changeable.

This will not stop an attacker, as an attacker can repackage the squashfs with their changes in it and replace the partition altogether.

This can also be done directly on the device, as the “003-storage-init” container contains the “mksquashfs” and “unsquashfs” binaries (with the corresponding libs).

An attacker can gain full control over the device without changing the PCR values, thus not triggering the “measured boot” mechanism, and having full access to the vault.

Note:

This issue was partially fixed in these commits (after disclosure to Zededa), where the config partition measurement was added to PCR13:

• aa3501d6c57206ced222c33aea15a9169d629141

• 5fef4d92e75838cc78010edaed5247dfbdae1889.

This issue was made viable in version 9.0.0 when the calculation was moved to PCR14 but it was not included in the measured boot.

References

  • asrg.io/security-advisories/19274
  • asrg.io/security-advisories/cve-2023-43636
  • github.com/advisories/GHSA-x9mp-jm4h-jjf8
  • nvd.nist.gov/vuln/detail/CVE-2023-43636

Code Behaviors & Features

Detect and mitigate GHSA-x9mp-jm4h-jjf8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20220708121648-5fef4d92e758

Fixed versions

  • 0.0.0-20220708121648-5fef4d92e758

Solution

Upgrade to version 0.0.0-20220708121648-5fef4d92e758 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-345: Insufficient Verification of Data Authenticity

Source file

go/github.com/lf-edge/eve/pkg/grub/GHSA-x9mp-jm4h-jjf8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 16 Feb 2026 12:21:25 +0000.