Bugs fixes in "edk2"
| Origin | Bug number | Title | Date fixed |
|---|---|---|---|
| CVE | CVE-2024-38796 | EDK2 contains a vulnerability in the PeCoffLoaderRelocateImage(). An Attacker may cause memory corruption due to an overflow via an adjacent network. | 2025-11-27 |
| CVE | CVE-2024-2511 | Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An atta | 2025-11-27 |
| CVE | CVE-2024-13176 | Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summ | 2025-11-27 |
| CVE | CVE-2024-1298 | EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A | 2025-11-27 |
| CVE | CVE-2024-0727 | Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summa | 2025-11-27 |
| CVE | CVE-2023-5678 | Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: | 2025-11-27 |
| CVE | CVE-2023-45237 | EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unaut | 2025-11-27 |
| CVE | CVE-2023-45236 | EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unaut | 2025-11-27 |
| CVE | CVE-2023-3817 | Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_ | 2025-11-27 |
| CVE | CVE-2023-3446 | Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_ | 2025-11-27 |
| CVE | CVE-2023-2650 | openssl Possible DoS translating ASN.1 object identifiers | 2025-11-27 |
| CVE | CVE-2023-0466 | The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. How | 2025-11-27 |
| CVE | CVE-2023-0465 | Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain check | 2025-11-27 |
| CVE | CVE-2023-0464 | A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that includ | 2025-11-27 |
| CVE | CVE-2023-0286 | openssl: X.400 address type confusion in X.509 GeneralName | 2025-11-27 |
| CVE | CVE-2023-0215 | openssl: Use-after-free following BIO_new_NDEF | 2025-11-27 |
| CVE | CVE-2022-4450 | openssl: Double free after calling PEM_read_bio_ex | 2025-11-27 |
| CVE | CVE-2022-4304 | openssl: Timing Oracle in RSA Decryption | 2025-11-27 |
| CVE | CVE-2022-0778 | Infinite loop in BN_mod_sqrt() reachable when parsing certificates | 2025-11-27 |
| CVE | CVE-2021-3712 | Read buffer overruns processing ASN.1 strings | 2025-11-27 |
About
-
Send Feedback to @ubuntu_updates