-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: edk2 security update Advisory ID: RHSA-2023:2932-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:2932 Issue date: 2023-05-16 CVE Names: CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286 ==================================================================== 1. Summary: An update for edk2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - noarch 3. Description: EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2164440 - CVE-2023-0286 openssl: X.400 address type confusion in X.509 GeneralName 2164487 - CVE-2022-4304 openssl: timing attack in RSA Decryption implementation 2164492 - CVE-2023-0215 openssl: use-after-free following BIO_new_NDEF 2164494 - CVE-2022-4450 openssl: double free after calling PEM_read_bio_ex 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: edk2-20220126gitbb1bba3d77-4.el8.src.rpm noarch: edk2-aarch64-20220126gitbb1bba3d77-4.el8.noarch.rpm edk2-ovmf-20220126gitbb1bba3d77-4.el8.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-4304 https://access.redhat.com/security/cve/CVE-2022-4450 https://access.redhat.com/security/cve/CVE-2023-0215 https://access.redhat.com/security/cve/CVE-2023-0286 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZGNvBNzjgjWX9erEAQgffQ/9HvbzkfEgQVpVIlEyJLWH1rEQ+nxeLB4/ ZYPoXef3Epph+dYxc8q1X6Li8Wvygn/qpCYKqsnsIksxT5mFjtKsj1LP01IZ+GwP dgNH/loBVM711fpH2krwop81ozOMXgeQdnsNzl5kBeEzncwjcRNYDIqQoCGfevCJ YUMre7JpLTUkX0tlvMa+3SY1nxdGw3V/5LSyuMJJOCmW2fABmahDW3ovPLKDJ2T5 DHrZE+hkCDK+Klefp48Pkg9lJm6oQbXnkcOhU5ptnBV5ByXccCAkq+UotC1halHJ mSyLFOVSpl4qdCMH+PtmdhXNtMw2NYJj0qxEYBBga+cmicfKhdYSf4yF+POJUS/a 1XgheSMgacP9JYFaoU96Gzd1Mf7gWhoPD+nExXma4KhpN8dOB6KiCgp7zcgv8fWj m6Uh+ltkD/lrlIGO9ye8aJGd3jYm2R+7RjA8KZVG5WY7uzy+tt0HLW19B1O199Fo Sv33oGrU5haSEEixRGdshC4X7hcTElzwra1nqXATsx0PniyXIo1W+O9yFrX+AAqG v7LenKX8lUaoWCNszqu3e7rWACrZvxQsLry6nwFj0giu9SorhVDPuAjqiDNgxkZq OpAJYrttbRPA5HuIa6y03wY5HjY5YUkzJXgH3hQD9foDUndq/oTs7CXoLOvYL+iS lweVx49ofzA=BPMh -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce