Red Hat Security Advisory 2021-3172-01 - EDK is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Issues addressed include a buffer overflow vulnerability.
609c017c87e05bf217a92ec96cf8737cd9d418a852c68e6da519e2a08388c375
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: edk2 security update
Advisory ID: RHSA-2021:3172-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3172
Issue date: 2021-08-17
=====================================================================
1. Summary:
An update for edk2 is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream EUS (v. 8.1) - noarch
3. Description:
EDK (Embedded Development Kit) is a project to enable UEFI support for
Virtual Machines. This package contains a sample 64-bit UEFI firmware for
QEMU and KVM.
Security Fix(es):
* edk2: remote buffer overflow in IScsiHexToBin function in
NetworkPkg/IScsiDxe (BZ#1956284)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1956284 - edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe
6. Package List:
Red Hat Enterprise Linux AppStream EUS (v. 8.1):
Source:
edk2-20190308git89910a39dcfd-6.el8_1.1.src.rpm
noarch:
edk2-aarch64-20190308git89910a39dcfd-6.el8_1.1.noarch.rpm
edk2-ovmf-20190308git89910a39dcfd-6.el8_1.1.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=3zV/
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce