ALAS2-2025-3022


Amazon Linux 2 Security Advisory: ALAS2-2025-3022
Advisory Released Date: 2025-10-14
Advisory Updated Date: 2025-10-14
Severity: Medium

Issue Overview:

Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary. (CVE-2025-9230)


Affected Packages:

edk2


Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update edk2 or yum update --advisory ALAS2-2025-3022 to update your system.

New Packages:
aarch64:
    edk2-tools-20240813-304.amzn2.aarch64
    edk2-debuginfo-20240813-304.amzn2.aarch64

noarch:
    edk2-ovmf-20240813-304.amzn2.noarch
    edk2-tools-doc-20240813-304.amzn2.noarch
    edk2-aarch64-20240813-304.amzn2.noarch

src:
    edk2-20240813-304.amzn2.src

x86_64:
    edk2-tools-20240813-304.amzn2.x86_64
    edk2-debuginfo-20240813-304.amzn2.x86_64