Action not permitted
Modal body text goes here.
cve-2022-36764
Vulnerability from cvelistv5
Published
2024-01-09 16:09
Modified
2024-09-04 15:13
Severity ?
EPSS score ?
Summary
Heap Buffer Overflow in Tcg2MeasurePeImage
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:14:28.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-36764", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T21:12:01.620840Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:13:09.526Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "edk2", "vendor": "TianoCore", "versions": [ { "lessThanOrEqual": "202311", "status": "affected", "version": "*", "versionType": "Stable" } ] } ], "credits": [ { "lang": "en", "type": "remediation developer", "user": "00000000-0000-4000-9000-000000000000", "value": "Doug Flick" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nEDK2 is susceptible to a vulnerability in the \u003ccode\u003eTcg2MeasurePeImage()\u003c/code\u003e function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\n\n" } ], "value": "\nEDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-09T16:09:44.836Z", "orgId": "65518388-201a-4f93-8712-366d21fe8d2c", "shortName": "TianoCore" }, "references": [ { "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Heap Buffer Overflow in Tcg2MeasurePeImage", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "65518388-201a-4f93-8712-366d21fe8d2c", "assignerShortName": "TianoCore", "cveId": "CVE-2022-36764", "datePublished": "2024-01-09T16:09:44.836Z", "dateReserved": "2022-07-25T19:43:11.215Z", "dateUpdated": "2024-09-04T15:13:09.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-36764\",\"sourceIdentifier\":\"infosec@edk2.groups.io\",\"published\":\"2024-01-09T16:15:43.327\",\"lastModified\":\"2024-03-13T02:15:49.983\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nEDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\\n\\n\"},{\"lang\":\"es\",\"value\":\"EDK2 es susceptible a una vulnerabilidad en la funci\u00f3n Tcg2MeasurePeImage(), lo que permite a un usuario desencadenar un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico a trav\u00e9s de una red local. La explotaci\u00f3n exitosa de esta vulnerabilidad puede resultar en un compromiso de confidencialidad, integridad y/o disponibilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"infosec@edk2.groups.io\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.1,\"impactScore\":5.3}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"infosec@edk2.groups.io\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"202311\",\"matchCriteriaId\":\"3CEB3105-57CC-4096-81D3-D58005813C4B\"}]}]}],\"references\":[{\"url\":\"https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j\",\"source\":\"infosec@edk2.groups.io\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/\",\"source\":\"infosec@edk2.groups.io\"}]}}" } }
gsd-2022-36764
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-36764", "id": "GSD-2022-36764" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-36764" ], "details": "\nEDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\n\n", "id": "GSD-2022-36764", "modified": "2023-12-13T01:19:21.774364Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "infosec@edk2.groups.io", "ID": "CVE-2022-36764", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "edk2", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "*", "version_value": "202311" } ] } } ] }, "vendor_name": "TianoCore" } ] } }, "credits": [ { "lang": "en", "value": "Doug Flick" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\nEDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\n\n" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-122", "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j", "refsource": "MISC", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CEB3105-57CC-4096-81D3-D58005813C4B", "versionEndIncluding": "202311", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "\nEDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.\n\n" }, { "lang": "es", "value": "EDK2 es susceptible a una vulnerabilidad en la funci\u00f3n Tcg2MeasurePeImage(), lo que permite a un usuario desencadenar un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico a trav\u00e9s de una red local. La explotaci\u00f3n exitosa de esta vulnerabilidad puede resultar en un compromiso de confidencialidad, integridad y/o disponibilidad." } ], "id": "CVE-2022-36764", "lastModified": "2024-03-13T02:15:49.983", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 5.3, "source": "infosec@edk2.groups.io", "type": "Secondary" } ] }, "published": "2024-01-09T16:15:43.327", "references": [ { "source": "infosec@edk2.groups.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" }, { "source": "infosec@edk2.groups.io", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/" } ], "sourceIdentifier": "infosec@edk2.groups.io", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "infosec@edk2.groups.io", "type": "Secondary" } ] } } } }
rhsa-2024_2264
Vulnerability from csaf_redhat
Published
2024-04-30 09:52
Modified
2024-11-06 05:40
Summary
Red Hat Security Advisory: edk2 security update
Notes
Topic
An update for edk2 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)
* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)
* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)
* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)
* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)
* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)
* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for edk2 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. \n\nSecurity Fix(es):\n\n* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)\n\n* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)\n\n* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)\n\n* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)\n\n* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)\n\n* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)\n\n* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)\n\n* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2264", "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2224962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962" }, { "category": "external", "summary": "2257582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257582" }, { "category": "external", "summary": "2257583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257583" }, { "category": "external", "summary": "2258677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258677" }, { "category": "external", "summary": "2258688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258688" }, { "category": "external", "summary": "2258691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258691" }, { "category": "external", "summary": "2258694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258694" }, { "category": "external", "summary": "2258700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258700" }, { "category": "external", "summary": "RHEL-14123", "url": "https://issues.redhat.com/browse/RHEL-14123" }, { "category": "external", "summary": "RHEL-20963", "url": "https://issues.redhat.com/browse/RHEL-20963" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2264.json" } ], "title": "Red Hat Security Advisory: edk2 security update", "tracking": { "current_release_date": "2024-11-06T05:40:37+00:00", "generator": { "date": "2024-11-06T05:40:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:2264", "initial_release_date": "2024-04-30T09:52:59+00:00", "revision_history": [ { "date": "2024-04-30T09:52:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T09:52:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T05:40:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 9)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "edk2-aarch64-0:20231122-6.el9.noarch", "product": { "name": "edk2-aarch64-0:20231122-6.el9.noarch", "product_id": "edk2-aarch64-0:20231122-6.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-aarch64@20231122-6.el9?arch=noarch" } } }, { "category": "product_version", "name": "edk2-ovmf-0:20231122-6.el9.noarch", "product": { "name": "edk2-ovmf-0:20231122-6.el9.noarch", "product_id": "edk2-ovmf-0:20231122-6.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-ovmf@20231122-6.el9?arch=noarch" } } }, { "category": "product_version", "name": "edk2-tools-doc-0:20231122-6.el9.noarch", "product": { "name": "edk2-tools-doc-0:20231122-6.el9.noarch", "product_id": "edk2-tools-doc-0:20231122-6.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-tools-doc@20231122-6.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "edk2-tools-0:20231122-6.el9.aarch64", "product": { "name": "edk2-tools-0:20231122-6.el9.aarch64", "product_id": "edk2-tools-0:20231122-6.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-tools@20231122-6.el9?arch=aarch64" } } }, { "category": "product_version", "name": "edk2-debugsource-0:20231122-6.el9.aarch64", "product": { "name": "edk2-debugsource-0:20231122-6.el9.aarch64", "product_id": "edk2-debugsource-0:20231122-6.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-debugsource@20231122-6.el9?arch=aarch64" } } }, { "category": "product_version", "name": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "product": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "product_id": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-tools-debuginfo@20231122-6.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "edk2-tools-0:20231122-6.el9.x86_64", "product": { "name": "edk2-tools-0:20231122-6.el9.x86_64", "product_id": "edk2-tools-0:20231122-6.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-tools@20231122-6.el9?arch=x86_64" } } }, { "category": "product_version", "name": "edk2-debugsource-0:20231122-6.el9.x86_64", "product": { "name": "edk2-debugsource-0:20231122-6.el9.x86_64", "product_id": "edk2-debugsource-0:20231122-6.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-debugsource@20231122-6.el9?arch=x86_64" } } }, { "category": "product_version", "name": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "product": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "product_id": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-tools-debuginfo@20231122-6.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "edk2-0:20231122-6.el9.src", "product": { "name": "edk2-0:20231122-6.el9.src", "product_id": "edk2-0:20231122-6.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2@20231122-6.el9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "edk2-0:20231122-6.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src" }, "product_reference": "edk2-0:20231122-6.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-aarch64-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch" }, "product_reference": "edk2-aarch64-0:20231122-6.el9.noarch", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-debugsource-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-debugsource-0:20231122-6.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-debugsource-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-debugsource-0:20231122-6.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-ovmf-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch" }, "product_reference": "edk2-ovmf-0:20231122-6.el9.noarch", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-tools-0:20231122-6.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-tools-0:20231122-6.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-doc-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" }, "product_reference": "edk2-tools-doc-0:20231122-6.el9.noarch", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-0:20231122-6.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src" }, "product_reference": "edk2-0:20231122-6.el9.src", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-aarch64-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch" }, "product_reference": "edk2-aarch64-0:20231122-6.el9.noarch", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-debugsource-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-debugsource-0:20231122-6.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-debugsource-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-debugsource-0:20231122-6.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-ovmf-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch" }, "product_reference": "edk2-ovmf-0:20231122-6.el9.noarch", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-tools-0:20231122-6.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-tools-0:20231122-6.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64" }, "product_reference": "edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64" }, "product_reference": "edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-tools-doc-0:20231122-6.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" }, "product_reference": "edk2-tools-doc-0:20231122-6.el9.noarch", "relates_to_product_reference": "CRB-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-36763", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257582" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found via the Tcg2MeasureGptTable() function in EDK2, arising from inadequate validation of the GPT Primary Header, presenting a minor risk to confidentiality and integrity. The primary consequence is likely a crash or denial of service. This issue may allow a local attacker to craft a GPT table, causing an integer overflow and consequent buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "EDK2: heap buffer overflow in Tcg2MeasureGptTable()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36763" }, { "category": "external", "summary": "RHBZ#2257582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257582" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36763", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36763" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr" } ], "release_date": "2024-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EDK2: heap buffer overflow in Tcg2MeasureGptTable()" }, { "cve": "CVE-2022-36764", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257583" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found via the Tcg2MeasurePeImage() function in EDK2. Successful exploitation requires a local attacker to trigger an integer overflow in the calculation of the EventSize variable at DxeTpm2MeasureBootLib.c, leading to the heap-buffer overflow, presenting a moderate risk to confidentiality and integrity. However, the primary consequence is likely a crash or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "EDK2: heap buffer overflow in Tcg2MeasurePeImage()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36764" }, { "category": "external", "summary": "RHBZ#2257583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36764" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" } ], "release_date": "2024-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EDK2: heap buffer overflow in Tcg2MeasurePeImage()" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224962" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in OpenSSL. This security flaw occurs because the applications that use the DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source may lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Excessive time spent checking DH keys and parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The CVE-2023-3446 vulnerability in OpenSSL has been classified as having a low impact due to several factors. Firstly, while the potential for a Denial of Service (DoS) attack exists, it requires specific conditions to be met, notably the use of DH_check(), DH_check_ex(), or EVP_PKEY_param_check() functions with DH keys or parameters obtained from untrusted sources. Secondly, the issue primarily affects the efficiency of key and parameter checks, rather than directly compromising the security or integrity of cryptographic operations. Given these considerations and the absence of widespread exploitation or significant consequences beyond performance degradation, the overall impact of this vulnerability is deemed low rather than moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3446" }, { "category": "external", "summary": "RHBZ#2224962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20230719.txt", "url": "https://www.openssl.org/news/secadv/20230719.txt" } ], "release_date": "2023-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Excessive time spent checking DH keys and parameters" }, { "cve": "CVE-2023-45229", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258677" } ], "notes": [ { "category": "description", "text": "A vulnerability has been identified in the NetworkPkg IP stack of EDK2, the open-source reference implementation of the UEFI specification. This flaw enables an unauthenticated attacker within the same network vicinity to transmit a specifically crafted DHCPv6 message. Exploiting this vulnerability may result in unauthorized access to memory beyond its boundaries, potentially leading to the exposure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified flaw in the NetworkPkg IP stack within the EDK2, an open-source UEFI implementation, poses a moderate security concern. This vulnerability allows an unauthenticated attacker within the same network to exploit via a crafted DHCPv6 message, potentially leading to the unauthorized access of memory beyond its designated boundaries. While the issue has the potential to leak sensitive information, its impact is considered moderate, requiring an attacker to be within the adjacent network for successful exploitation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45229" }, { "category": "external", "summary": "RHBZ#2258677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45229" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message" }, { "cve": "CVE-2023-45231", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258688" } ], "notes": [ { "category": "description", "text": "A security loophole involving an out-of-bounds read was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted Neighbor Discovery Redirect message. Consequently, this may lead to the unauthorized reading of memory beyond the message boundaries, potentially resulting in the exposure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Out of Bounds read when handling a ND Redirect message with truncated options", "title": "Vulnerability summary" }, { "category": "other", "text": "The out-of-bounds read vulnerability in EDK2 represents a moderate security concern. This flaw, found in the open-source implementation of the UEFI specification, allows an attacker within the local network to exploit the issue by sending a carefully crafted Neighbor Discovery Redirect message. While requiring proximity for exploitation, the vulnerability could lead to unauthorized memory access and potential leakage of sensitive information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45231" }, { "category": "external", "summary": "RHBZ#2258688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45231" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-pr27-mhpp-2ccr", "url": "https://github.com/advisories/GHSA-pr27-mhpp-2ccr" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Out of Bounds read when handling a ND Redirect message with truncated options" }, { "cve": "CVE-2023-45232", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258691" } ], "notes": [ { "category": "description", "text": "A security loophole involving an infinite loop was identified in EDK2, the open-source reference implementation of the UEFI specification. This weakness enables an unauthorized attacker to exploit system availability by sending a specifically crafted Destination Options IPv6 header.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Infinite loop when parsing unknown options in the Destination Options header", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified flaw in the NetworkPkg IP stack within the EDK2, an open-source UEFI implementation, poses a moderate security concern as the vulnerability allows an unauthenticated attacker within the same local network to exploit via a specifically crafted Destination Options IPv6 header.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45232" }, { "category": "external", "summary": "RHBZ#2258691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45232" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-3r3p-444m-2g4p", "url": "https://github.com/advisories/GHSA-3r3p-444m-2g4p" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Infinite loop when parsing unknown options in the Destination Options header" }, { "cve": "CVE-2023-45233", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258694" } ], "notes": [ { "category": "description", "text": "The Network Package in EDK2 is vulnerable to an infinite loop exploit when parsing a PadN option within the Destination Options header of IPv6. This flaw allows an unauthorized attacker to gain access and potentially result in a loss of system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Infinite loop when parsing a PadN option in the Destination Options header", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified vulnerability in EDK2\u0027s Network Package poses a moderate risk due to an infinite loop in the Ip6IsOptionValid function, specifically when parsing a PadN option in the Destination Options header of an IPv6 packet. This flaw occurs because the addition of 0x100 to the Offset variable is truncated to a UINT8, resulting in an unmodified Offset. As a consequence of this infinite loop, the affected computer never finishes booting up.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45233" }, { "category": "external", "summary": "RHBZ#2258694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45233" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-p9h6-p7cr-7842", "url": "https://github.com/advisories/GHSA-p9h6-p7cr-7842" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Infinite loop when parsing a PadN option in the Destination Options header" }, { "cve": "CVE-2023-45235", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258700" } ], "notes": [ { "category": "description", "text": "A security flaw involving buffer overflow was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity network to transmit a specifically crafted DHCPv6 proxy Advertise message, resulting in the disclosure of information and potential compromise of system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message", "title": "Vulnerability summary" }, { "category": "other", "text": "The discovery of a buffer overflow vulnerability in EDK2, the open-source implementation of the UEFI specification, raises significant concerns for system security. This flaw, when exploited by an unauthorized attacker on the same network, allows for the transmission of a malicious DHCPv6 proxy Advertise message. This can lead to the compromise of sensitive information and poses a serious threat to the availability of the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45235" }, { "category": "external", "summary": "RHBZ#2258700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45235" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-h9v6-q439-p7j2", "url": "https://github.com/advisories/GHSA-h9v6-q439-p7j2" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:edk2-0:20231122-6.el9.src", "AppStream-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "AppStream-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "AppStream-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-0:20231122-6.el9.src", "CRB-9.4.0.GA:edk2-aarch64-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-debugsource-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-ovmf-0:20231122-6.el9.noarch", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.aarch64", "CRB-9.4.0.GA:edk2-tools-debuginfo-0:20231122-6.el9.x86_64", "CRB-9.4.0.GA:edk2-tools-doc-0:20231122-6.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message" } ] }
rhsa-2024_3017
Vulnerability from csaf_redhat
Published
2024-05-22 09:52
Modified
2024-11-06 05:53
Summary
Red Hat Security Advisory: edk2 security update
Notes
Topic
An update for edk2 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)
* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)
* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)
* EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W (CVE-2022-36765)
* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)
* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)
* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)
* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for edk2 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. \n\nSecurity Fix(es):\n\n* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)\n\n* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)\n\n* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)\n\n* EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W (CVE-2022-36765)\n\n* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)\n\n* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)\n\n* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)\n\n* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3017", "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2257582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257582" }, { "category": "external", "summary": "2257583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257583" }, { "category": "external", "summary": "2257584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257584" }, { "category": "external", "summary": "2258677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258677" }, { "category": "external", "summary": "2258688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258688" }, { "category": "external", "summary": "2258691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258691" }, { "category": "external", "summary": "2258694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258694" }, { "category": "external", "summary": "2258700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258700" }, { "category": "external", "summary": "RHEL-12626", "url": "https://issues.redhat.com/browse/RHEL-12626" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3017.json" } ], "title": "Red Hat Security Advisory: edk2 security update", "tracking": { "current_release_date": "2024-11-06T05:53:45+00:00", "generator": { "date": "2024-11-06T05:53:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:3017", "initial_release_date": "2024-05-22T09:52:32+00:00", "revision_history": [ { "date": "2024-05-22T09:52:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-22T09:52:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T05:53:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "product": { "name": "edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "product_id": "edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2@20220126gitbb1bba3d77-13.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product": { "name": "edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product_id": "edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-aarch64@20220126gitbb1bba3d77-13.el8_10?arch=noarch" } } }, { "category": "product_version", "name": "edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product": { "name": "edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product_id": "edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/edk2-ovmf@20220126gitbb1bba3d77-13.el8_10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "edk2-0:20220126gitbb1bba3d77-13.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src" }, "product_reference": "edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch" }, "product_reference": "edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" }, "product_reference": "edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch", "relates_to_product_reference": "AppStream-8.10.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-36763", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257582" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found via the Tcg2MeasureGptTable() function in EDK2, arising from inadequate validation of the GPT Primary Header, presenting a minor risk to confidentiality and integrity. The primary consequence is likely a crash or denial of service. This issue may allow a local attacker to craft a GPT table, causing an integer overflow and consequent buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "EDK2: heap buffer overflow in Tcg2MeasureGptTable()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36763" }, { "category": "external", "summary": "RHBZ#2257582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257582" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36763", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36763" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr" } ], "release_date": "2024-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EDK2: heap buffer overflow in Tcg2MeasureGptTable()" }, { "cve": "CVE-2022-36764", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257583" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found via the Tcg2MeasurePeImage() function in EDK2. Successful exploitation requires a local attacker to trigger an integer overflow in the calculation of the EventSize variable at DxeTpm2MeasureBootLib.c, leading to the heap-buffer overflow, presenting a moderate risk to confidentiality and integrity. However, the primary consequence is likely a crash or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "EDK2: heap buffer overflow in Tcg2MeasurePeImage()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36764" }, { "category": "external", "summary": "RHBZ#2257583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36764" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36764", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36764" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j" } ], "release_date": "2024-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EDK2: heap buffer overflow in Tcg2MeasurePeImage()" }, { "cve": "CVE-2022-36765", "cwe": { "id": "CWE-680", "name": "Integer Overflow to Buffer Overflow" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257584" } ], "notes": [ { "category": "description", "text": "A flaw was found in the CreateHob() function in EDK2. An attacker, leveraging a local network, can initiate an integer overflow leading to a buffer overflow. This issue arises during size alignment within the CreateHob() function, requiring activation in the PEI phase. Successful exploitation of this flaw poses a moderate threat to confidentiality and integrity, however, the primary consequence is likely a crash or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has protection mechanisms in place against buffer overflows, such as FORTIFY_SOURCE, Position Independent Executables or Stack Smashing Protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36765" }, { "category": "external", "summary": "RHBZ#2257584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36765" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx" } ], "release_date": "2024-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W" }, { "cve": "CVE-2023-45229", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258677" } ], "notes": [ { "category": "description", "text": "A vulnerability has been identified in the NetworkPkg IP stack of EDK2, the open-source reference implementation of the UEFI specification. This flaw enables an unauthenticated attacker within the same network vicinity to transmit a specifically crafted DHCPv6 message. Exploiting this vulnerability may result in unauthorized access to memory beyond its boundaries, potentially leading to the exposure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified flaw in the NetworkPkg IP stack within the EDK2, an open-source UEFI implementation, poses a moderate security concern. This vulnerability allows an unauthenticated attacker within the same network to exploit via a crafted DHCPv6 message, potentially leading to the unauthorized access of memory beyond its designated boundaries. While the issue has the potential to leak sensitive information, its impact is considered moderate, requiring an attacker to be within the adjacent network for successful exploitation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45229" }, { "category": "external", "summary": "RHBZ#2258677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45229", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45229" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h", "url": "https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message" }, { "cve": "CVE-2023-45231", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258688" } ], "notes": [ { "category": "description", "text": "A security loophole involving an out-of-bounds read was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity of the network to transmit a specifically crafted Neighbor Discovery Redirect message. Consequently, this may lead to the unauthorized reading of memory beyond the message boundaries, potentially resulting in the exposure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Out of Bounds read when handling a ND Redirect message with truncated options", "title": "Vulnerability summary" }, { "category": "other", "text": "The out-of-bounds read vulnerability in EDK2 represents a moderate security concern. This flaw, found in the open-source implementation of the UEFI specification, allows an attacker within the local network to exploit the issue by sending a carefully crafted Neighbor Discovery Redirect message. While requiring proximity for exploitation, the vulnerability could lead to unauthorized memory access and potential leakage of sensitive information.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45231" }, { "category": "external", "summary": "RHBZ#2258688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45231", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45231" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45231", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45231" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-pr27-mhpp-2ccr", "url": "https://github.com/advisories/GHSA-pr27-mhpp-2ccr" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Out of Bounds read when handling a ND Redirect message with truncated options" }, { "cve": "CVE-2023-45232", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258691" } ], "notes": [ { "category": "description", "text": "A security loophole involving an infinite loop was identified in EDK2, the open-source reference implementation of the UEFI specification. This weakness enables an unauthorized attacker to exploit system availability by sending a specifically crafted Destination Options IPv6 header.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Infinite loop when parsing unknown options in the Destination Options header", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified flaw in the NetworkPkg IP stack within the EDK2, an open-source UEFI implementation, poses a moderate security concern as the vulnerability allows an unauthenticated attacker within the same local network to exploit via a specifically crafted Destination Options IPv6 header.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45232" }, { "category": "external", "summary": "RHBZ#2258691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45232", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45232" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45232", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45232" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-3r3p-444m-2g4p", "url": "https://github.com/advisories/GHSA-3r3p-444m-2g4p" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Infinite loop when parsing unknown options in the Destination Options header" }, { "cve": "CVE-2023-45233", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258694" } ], "notes": [ { "category": "description", "text": "The Network Package in EDK2 is vulnerable to an infinite loop exploit when parsing a PadN option within the Destination Options header of IPv6. This flaw allows an unauthorized attacker to gain access and potentially result in a loss of system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Infinite loop when parsing a PadN option in the Destination Options header", "title": "Vulnerability summary" }, { "category": "other", "text": "The identified vulnerability in EDK2\u0027s Network Package poses a moderate risk due to an infinite loop in the Ip6IsOptionValid function, specifically when parsing a PadN option in the Destination Options header of an IPv6 packet. This flaw occurs because the addition of 0x100 to the Offset variable is truncated to a UINT8, resulting in an unmodified Offset. As a consequence of this infinite loop, the affected computer never finishes booting up.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45233" }, { "category": "external", "summary": "RHBZ#2258694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258694" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45233", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45233" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45233", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45233" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-p9h6-p7cr-7842", "url": "https://github.com/advisories/GHSA-p9h6-p7cr-7842" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "edk2: Infinite loop when parsing a PadN option in the Destination Options header" }, { "cve": "CVE-2023-45235", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2258700" } ], "notes": [ { "category": "description", "text": "A security flaw involving buffer overflow was identified in EDK2, the open-source reference implementation of the UEFI specification. This vulnerability enables an unauthorized attacker within the vicinity network to transmit a specifically crafted DHCPv6 proxy Advertise message, resulting in the disclosure of information and potential compromise of system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message", "title": "Vulnerability summary" }, { "category": "other", "text": "The discovery of a buffer overflow vulnerability in EDK2, the open-source implementation of the UEFI specification, raises significant concerns for system security. This flaw, when exploited by an unauthorized attacker on the same network, allows for the transmission of a malicious DHCPv6 proxy Advertise message. This can lead to the compromise of sensitive information and poses a serious threat to the availability of the system.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-45235" }, { "category": "external", "summary": "RHBZ#2258700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-45235", "url": "https://www.cve.org/CVERecord?id=CVE-2023-45235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45235" }, { "category": "external", "summary": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html", "url": "https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-h9v6-q439-p7j2", "url": "https://github.com/advisories/GHSA-h9v6-q439-p7j2" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T09:52:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:edk2-0:20220126gitbb1bba3d77-13.el8_10.src", "AppStream-8.10.0.GA:edk2-aarch64-0:20220126gitbb1bba3d77-13.el8_10.noarch", "AppStream-8.10.0.GA:edk2-ovmf-0:20220126gitbb1bba3d77-13.el8_10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message" } ] }
wid-sec-w-2024-0050
Vulnerability from csaf_certbund
Published
2024-01-09 23:00
Modified
2024-07-24 22:00
Summary
Insyde UEFI Firmware: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
InsydeH2O UEFI BIOS ist eine proprietäre, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterstützt.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "InsydeH2O UEFI BIOS ist eine propriet\u00e4re, lizenzierte UEFI-BIOS-Firmware, die Intel und AMD basierte Computer unterst\u00fctzt.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Insyde UEFI Firmware ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0050 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0050.json" }, { "category": "self", "summary": "WID-SEC-2024-0050 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0050" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-A9DEAD34C5 vom 2024-02-26", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-a9dead34c5" }, { "category": "external", "summary": "Insyde Security Advisory 2023031 vom 2024-01-09", "url": "https://www.insyde.com/security-pledge/SA-2023031" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-115697 vom 2024-01-09", "url": "https://support.lenovo.com/us/en/product_security/LEN-115697" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6638-1 vom 2024-02-15", "url": "https://ubuntu.com/security/notices/USN-6638-1" }, { "category": "external", "summary": "Debian Security Advisory DSA-5624 vom 2024-02-14", "url": "https://lists.debian.org/debian-security-announce/2024/msg00031.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-191 vom 2024-01-11", "url": "https://www.dell.com/support/kbdoc/000215643/dsa-2023-=" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2465 vom 2024-02-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2465.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-081 vom 2024-02-21", "url": "https://www.dell.com/support/kbdoc/000222227/dsa-2024-=" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-20865 vom 2024-04-25", "url": "https://linux.oracle.com/errata/ELSA-2024-20865.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12343 vom 2024-04-25", "url": "https://linux.oracle.com/errata/ELSA-2024-12343.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2264 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3017 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3017" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-23120 vom 2024-06-04", "url": "https://linux.oracle.com/errata/ELSA-2024-23120.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12409 vom 2024-06-04", "url": "https://linux.oracle.com/errata/ELSA-2024-12409.html" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03946 vom 2024-06-07", "url": "https://support.hp.com/us-en/document/ish_10767180-10767204-16/HPSBHF03946" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:4749 vom 2024-07-24", "url": "https://access.redhat.com/errata/RHSA-2024:4749" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-4749 vom 2024-07-25", "url": "https://linux.oracle.com/errata/ELSA-2024-4749.html" } ], "source_lang": "en-US", "title": "Insyde UEFI Firmware: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-07-24T22:00:00.000+00:00", "generator": { "date": "2024-07-25T08:36:31.102+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0050", "initial_release_date": "2024-01-09T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu und Debian aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-20T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-02-26T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-06-17T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-07-23T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-07-24T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "branches": [ { "category": "product_version_range", "name": "T30 \u003c1.14.0", "product": { "name": "Dell PowerEdge T30 \u003c1.14.0", "product_id": "T032970", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:t30__1.14.0" } } }, { "category": "product_version_range", "name": "T40 \u003c1.14.0", "product": { "name": "Dell PowerEdge T40 \u003c1.14.0", "product_id": "T032972", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:t40__1.14.0" } } } ], "category": "product_name", "name": "PowerEdge" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c05.28.49", "product": { "name": "Insyde UEFI Firmware \u003c05.28.49", "product_id": "T031963", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:05.28.49" } } }, { "category": "product_version_range", "name": "\u003c05.37.49", "product": { "name": "Insyde UEFI Firmware \u003c05.37.49", "product_id": "T031964", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:05.37.49" } } }, { "category": "product_version_range", "name": "\u003c05.45.49", "product": { "name": "Insyde UEFI Firmware \u003c05.45.49", "product_id": "T031965", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:05.45.49" } } }, { "category": "product_version_range", "name": "\u003c05.53.50", "product": { "name": "Insyde UEFI Firmware \u003c05.53.50", "product_id": "T031966", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:05.53.50" } } }, { "category": "product_version_range", "name": "\u003c05.60.50", "product": { "name": "Insyde UEFI Firmware \u003c05.60.50", "product_id": "T031967", "product_identification_helper": { "cpe": "cpe:/h:insyde:uefi:05.60.50" } } } ], "category": "product_name", "name": "UEFI Firmware" } ], "category": "vendor", "name": "Insyde" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-36763", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware von Insyde. Diese Fehler bestehen in den Komponenten \"SecurityPkg\" und \"UefiPayloadPkg\" aufgrund eines Heap-Puffer\u00fcberlaufs und eines Integer-\u00dcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T006498", "T023191", "T032972", "2951", "67646", "T000126", "398363", "T004914", "T032970", "74185" ] }, "release_date": "2024-01-09T23:00:00Z", "title": "CVE-2022-36763" }, { "cve": "CVE-2022-36764", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware von Insyde. Diese Fehler bestehen in den Komponenten \"SecurityPkg\" und \"UefiPayloadPkg\" aufgrund eines Heap-Puffer\u00fcberlaufs und eines Integer-\u00dcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T006498", "T023191", "T032972", "2951", "67646", "T000126", "398363", "T004914", "T032970", "74185" ] }, "release_date": "2024-01-09T23:00:00Z", "title": "CVE-2022-36764" }, { "cve": "CVE-2022-36765", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der UEFI-Firmware von Insyde. Diese Fehler bestehen in den Komponenten \"SecurityPkg\" und \"UefiPayloadPkg\" aufgrund eines Heap-Puffer\u00fcberlaufs und eines Integer-\u00dcberlaufs. Ein lokaler Angreifer kann diese Schwachstellen zur Ausf\u00fchrung von beliebigem Code ausnutzen." } ], "product_status": { "known_affected": [ "T006498", "T023191", "T032972", "2951", "67646", "T000126", "398363", "T004914", "T032970", "74185" ] }, "release_date": "2024-01-09T23:00:00Z", "title": "CVE-2022-36765" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.