Amazon Linux 2 : edk2 (ALAS-2024-2722)

high Nessus Plugin ID 213371

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2024-2722 advisory.

A heap overflow in LzmaUefiDecompressGetInfo function in EDK II. (CVE-2021-28211)

BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. (CVE-2021-28216)

A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.
(CVE-2021-38576)

Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
(CVE-2021-38578)

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. Thisvulnerability can be exploited by an attacker to gain unauthorizedaccess and potentially lead to a loss of Confidentiality.
(CVE-2023-45236)

EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. Thisvulnerability can be exploited by an attacker to gain unauthorizedaccess and potentially lead to a loss of Confidentiality.
(CVE-2023-45237)

EDK2 contains a vulnerability in the PeCoffLoaderRelocateImage(). An Attacker may cause memory corruption due to an overflow via an adjacent network. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability. (CVE-2024-38796)

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrustedexplicit values for the field polynomial can lead to out-of-bounds memory readsor writes.

Impact summary: Out of bound memory writes can lead to an application crash oreven a possibility of a remote code execution, however, in all the protocolsinvolving Elliptic Curve Cryptography that we're aware of, either only namedcurves are supported, or, if explicit curve parameters are supported, theyspecify an X9.62 encoding of binary (GF(2^m)) curves that can't representproblematic input values. Thus the likelihood of existence of a vulnerableapplication is low.

In particular, the X9.62 encoding is used for ECC keys in X.509 certificates,so problematic inputs cannot occur in the context of processing X.509certificates. Any problematic use-cases would have to be using an exoticcurve encoding.

The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),and various supporting BN_GF2m_*() functions.

Applications working with exotic explicit binary (GF(2^m)) curve parameters,that make it possible to represent invalid field polynomials with a zeroconstant term, via the above or similar APIs, may terminate abruptly as aresult of reading or writing outside of array bounds. Remote code executioncannot easily be ruled out.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. (CVE-2024-9143)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update edk2' to update your system.

See Also

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/AL2/ALAS-2024-2722.html

https://alas.aws.amazon.com/cve/html/CVE-2021-28211.html

https://alas.aws.amazon.com/cve/html/CVE-2021-28216.html

https://alas.aws.amazon.com/cve/html/CVE-2021-38576.html

https://alas.aws.amazon.com/cve/html/CVE-2021-38578.html

https://alas.aws.amazon.com/cve/html/CVE-2023-45236.html

https://alas.aws.amazon.com/cve/html/CVE-2023-45237.html

https://alas.aws.amazon.com/cve/html/CVE-2024-38796.html

https://alas.aws.amazon.com/cve/html/CVE-2024-9143.html

Plugin Details

Severity: High

ID: 213371

File Name: al2_ALAS-2024-2722.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/23/2024

Updated: 12/23/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-38578

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.2

Threat Score: 6.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2024-9143

Vulnerability Information

CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:edk2-aarch64, p-cpe:/a:amazon:linux:edk2-debuginfo, p-cpe:/a:amazon:linux:edk2-ovmf, p-cpe:/a:amazon:linux:edk2-tools, p-cpe:/a:amazon:linux:edk2-tools-doc

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: No known exploits are available

Patch Publication Date: 12/5/2024

Vulnerability Publication Date: 6/11/2021

Reference Information

CVE: CVE-2021-28211, CVE-2021-28216, CVE-2021-38576, CVE-2021-38578, CVE-2023-45236, CVE-2023-45237, CVE-2024-38796, CVE-2024-9143