<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0136</id>
    <title>An update for edk2 is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2025-05-20 06:42:51"/>
    <updated date="2025-05-20 06:42:51"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-9143" id="CVE-2024-9143" title="CVE-2024-9143 Base Score: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176" id="CVE-2024-13176" title="CVE-2024-13176 Base Score: 4.1 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-38797" id="CVE-2024-38797" title="CVE-2024-38797 Base Score: 4.6 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741" id="CVE-2024-4741" title="CVE-2024-4741 Base Score: 8.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted
explicit values for the field polynomial can lead to out-of-bounds memory reads
or writes.

Impact summary: Out of bound memory writes can lead to an application crash or
even a possibility of a remote code execution, however, in all the protocols
involving Elliptic Curve Cryptography that we_x27;re aware of, either only &quot;named
curves&quot; are supported, or, if explicit curve parameters are supported, they
specify an X9.62 encoding of binary (GF(2^m)) curves that can_x27;t represent
problematic input values. Thus the likelihood of existence of a vulnerable
application is low.

In particular, the X9.62 encoding is used for ECC keys in X.509 certificates,
so problematic inputs cannot occur in the context of processing X.509
certificates.  Any problematic use-cases would have to be using an &quot;exotic&quot;
curve encoding.

The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(),
and various supporting BN_GF2m_*() functions.

Applications working with &quot;exotic&quot; explicit binary (GF(2^m)) curve parameters,
that make it possible to represent invalid field polynomials with a zero
constant term, via the above or similar APIs, may terminate abruptly as a
result of reading or writing outside of array bounds.  Remote code execution
cannot easily be ruled out.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. (CVE-2024-9143)

Issue summary: A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.

Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.

There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low. (CVE-2024-13176)

EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via an adjecent network. A successful exploit of this vulnerability may lead to a loss of Integrity and/or Availability. (CVE-2024-38797)

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. (CVE-2024-4741)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="edk2">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="edk2-devel" version="202011" release="25.r1.hce2">
          <filename>edk2-devel-202011-25.r1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="edk2-help" version="202011" release="25.r1.hce2">
          <filename>edk2-help-202011-25.r1.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="python3-edk2-devel" version="202011" release="25.r1.hce2">
          <filename>python3-edk2-devel-202011-25.r1.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="edk2-devel" version="202011" release="25.r1.hce2">
          <filename>edk2-devel-202011-25.r1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="edk2-ovmf" version="202011" release="25.r1.hce2">
          <filename>edk2-ovmf-202011-25.r1.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
