{"id":"ALSA-2024:2264","summary":"Important: edk2 security update","details":"EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. \n\nSecurity Fix(es):\n\n* edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (CVE-2023-45235)\n* EDK2: heap buffer overflow in Tcg2MeasureGptTable() (CVE-2022-36763)\n* EDK2: heap buffer overflow in Tcg2MeasurePeImage() (CVE-2022-36764)\n* edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (CVE-2023-45229)\n* edk2: Out of Bounds read when handling a ND Redirect message with truncated options (CVE-2023-45231)\n* edk2: Infinite loop when parsing unknown options in the Destination Options header (CVE-2023-45232)\n* edk2: Infinite loop when parsing a PadN option in the Destination Options header (CVE-2023-45233)\n* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-02-04T03:07:31.522947Z","published":"2024-04-30T00:00:00Z","related":["CVE-2022-36763","CVE-2022-36764","CVE-2023-3446","CVE-2023-45229","CVE-2023-45231","CVE-2023-45232","CVE-2023-45233","CVE-2023-45235"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2264"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36763"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36764"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3446"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45229"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45231"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45232"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45233"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45235"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2224962"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257582"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257583"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258677"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258688"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258691"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258694"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2258700"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2024-2264.html"}],"affected":[{"package":{"name":"edk2-aarch64","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/edk2-aarch64"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231122-6.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2264.json"}},{"package":{"name":"edk2-ovmf","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/edk2-ovmf"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231122-6.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2264.json"}},{"package":{"name":"edk2-tools","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/edk2-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231122-6.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2264.json"}},{"package":{"name":"edk2-tools-doc","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/edk2-tools-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20231122-6.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2264.json"}}],"schema_version":"1.7.3"}