-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: edk2 security update Advisory ID: RHSA-2021:3369-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3369 Issue date: 2021-08-31 ===================================================================== 1. Summary: An update for edk2 is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.2) - noarch 3. Description: EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe (BZ#1956284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1956284 - edk2: remote buffer overflow in IScsiHexToBin function in NetworkPkg/IScsiDxe 6. Package List: Red Hat Enterprise Linux AppStream EUS (v. 8.2): Source: edk2-20190829git37eef91017ad-9.el8_2.1.src.rpm noarch: edk2-aarch64-20190829git37eef91017ad-9.el8_2.1.noarch.rpm edk2-ovmf-20190829git37eef91017ad-9.el8_2.1.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYS3y8NzjgjWX9erEAQjjeQ/+JNVLHU3M0FvVqAKpknAsJu7jkIkZ6JzM 8A8iQkzaCWYmDlFEQh8/FEpdqNjwRqvZLrm0WloxzBqlmNBy9xKGqievPZN8OK0h w8zlhTuE/q0sIHjPmugxUdzTxOrVKeRqj893gqSUXgFL+hwLYiZW1YEsHHUsvEy9 Og1H48TD6ewFxoBci9jaNzJE5q5xySCnv0raL6QLN4WfnlGP0EHvofqjIm+vdsp8 LJwKzFJg20R+PbrAbFV8aLCEIu46/00x1SjPeoLi4cBXtdb8JxrHZytIG2vXF/8k gOzqPmy9opblAky8HvamptBgCF5kP4rOCKLhtwtx/htvCB2u1ipq+CfRpLq0OW2O TvyfRVvbF+cS68uJHVxV5RTYhRDZD2H4cF8pYPnpzav7oFhaoChhx8UgN6WLVRK4 vaPiCx9O3wKvLY970jFR5nI626tV1dCOO7zUtZ/m+rcPq70U0LvQdR7eHgZ5bgxT mSCfmb/MVknLHR6ENYXUXzd6VI1JJmSKdyJUyygqMnCnw/BW8XLcCtoNyfm4Jig6 LgY3qSqK6eQOzKnYZ+aEnvAPxj2n7D7nOHTTj1X8zCiiRf5yyd44NhBTfKgugjyH tD4VrBgzaasbW0QhmDnN1fXWvV6MLiy1I/bEbHLWKcyfGo3V2ojPLXY/PgOmba6y HKrwZV6acd8= =2tAN -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce