USN-7060-1: EDK II vulnerabilities

Publication date

10 October 2024

Overview

Several security issues were fixed in EDK II.


Packages

  • edk2 - UEFI firmware for virtual machines

Details

It was discovered that EDK II did not check the buffer length in XHCI,
which could lead to a stack overflow. A local attacker could potentially
use this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-0161)

Laszlo Ersek discovered that EDK II incorrectly handled recursion. A
remote attacker could possibly use this issue to cause EDK II to consume
resources, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2021-28210)

Satoshi Tanda discovered that EDK II incorrectly handled decompressing
certain images. A remote attacker could use this issue to cause EDK II to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(

It was discovered that EDK II did not check the buffer length in XHCI,
which could lead to a stack overflow. A local attacker could potentially
use this issue to cause a denial of service. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2019-0161)

Laszlo Ersek discovered that EDK II incorrectly handled recursion. A
remote attacker could possibly use this issue to cause EDK II to consume
resources, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2021-28210)

Satoshi Tanda discovered that EDK II incorrectly handled decompressing
certain images. A remote attacker could use this issue to cause EDK II to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2021-28211)

It was discovered that EDK II incorrectly decoded certain strings. A remote
attacker could use this issue to cause EDK II to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2021-38575)

It was discovered that EDK II had integer underflow vulnerability in
SmmEntryPoint, which could result in a buffer overflow. An attacker
could potentially use this issue to cause a denial of service.
(CVE-2021-38578)

Elison Niven discovered that OpenSSL, vendored in EDK II, incorrectly
handled the c_rehash script. A local attacker could possibly use this
issue to execute arbitrary commands when c_rehash is run. This issue
only affected Ubuntu 16.04 LTS. (CVE-2022-1292)


Update instructions

After a standard system update you need to restart the virtual machines that use the affected firmware to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.04 jammy ovmf –  2022.02-3ubuntu0.22.04.3
ovmf-ia32 –  2022.02-3ubuntu0.22.04.3
qemu-efi-aarch64 –  2022.02-3ubuntu0.22.04.3
qemu-efi-arm –  2022.02-3ubuntu0.22.04.3
20.04 focal ovmf –  0~20191122.bd85bf54-2ubuntu3.6
qemu-efi-aarch64 –  0~20191122.bd85bf54-2ubuntu3.6
qemu-efi-arm –  0~20191122.bd85bf54-2ubuntu3.6
18.04 bionic ovmf –  0~20180205.c0d9813c-2ubuntu0.3+esm2  
qemu-efi-aarch64 –  0~20180205.c0d9813c-2ubuntu0.3+esm2  
qemu-efi-arm –  0~20180205.c0d9813c-2ubuntu0.3+esm2  
16.04 xenial ovmf –  0~20160408.ffea0a2c-2ubuntu0.2+esm3  
qemu-efi –  0~20160408.ffea0a2c-2ubuntu0.2+esm3  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›