-----BEGIN PGP SIGNATURE-----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=qqpm
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6920-1
July 29, 2024
edk2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in EDK II.
Software Description:
- edk2: UEFI firmware for virtual machines
Details:
It was discovered that EDK II was not properly performing bounds checks
in Tianocompress, which could lead to a buffer overflow. An authenticated
user could use this issue to potentially escalate their privileges via
local access. (CVE-2017-5731)
It was discovered that EDK II had an insufficient memory write check in
the SMM service, which could lead to a page fault occurring. An
authenticated user could use this issue to potentially escalate their
privileges, disclose information and/or create a denial of service via
local access. (CVE-2018-12182)
It was discovered that EDK II incorrectly handled memory in DxeCore, which
could lead to a stack overflow. An unauthenticated user could this
issue to potentially escalate their privileges, disclose information
and/or create a denial of service via local access. This issue only
affected Ubuntu 18.04 LTS. (CVE-2018-12183)
It was discovered that EDK II incorrectly handled memory in the
Variable service under certain circumstances. An authenticated user could
use this issue to potentially escalate their privileges, disclose
information and/or create a denial of service via local access.
(CVE-2018-3613)
It was discovered that EDK II incorrectly handled memory in its system
firmware, which could lead to a buffer overflow. An unauthenticated user
could use this issue to potentially escalate their privileges and/or
create a denial of service via network access. This issue only affected
Ubuntu 18.04 LTS. (CVE-2019-0160)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS
ovmf 0~20180205.c0d9813c-2ubuntu0.3+esm1
Available with Ubuntu Pro
qemu-efi 0~20180205.c0d9813c-2ubuntu0.3+esm1
Available with Ubuntu Pro
qemu-efi-aarch64 0~20180205.c0d9813c-2ubuntu0.3+esm1
Available with Ubuntu Pro
qemu-efi-arm 0~20180205.c0d9813c-2ubuntu0.3+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
ovmf 0~20160408.ffea0a2c-2ubuntu0.2+esm1
Available with Ubuntu Pro
qemu-efi 0~20160408.ffea0a2c-2ubuntu0.2+esm1
Available with Ubuntu Pro
After a standard system update you need to restart the virtual machines
that use the affected firmware to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6920-1
CVE-2017-5731, CVE-2018-12182, CVE-2018-12183, CVE-2018-3613,
CVE-2019-0160
No comments:
Post a Comment