edk2-20241117-4.el9_7.3
エラータID: AXSA:2026-204:01
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
Security Fix(es):
* openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap (CVE-2025-9230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-9230
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Update packages.
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
N/A
SRPMS
- edk2-20241117-4.el9_7.3.src.rpm
MD5: 8f82baaeed49f68b2d3763b5ece8e330
SHA-256: a3f5e674063d8e0749e496f38d53f06e4426bc5c417a0fa4e07cf027fdfcb8cd
Size: 19.89 MB
Asianux Server 9 for x86_64
- edk2-ovmf-20241117-4.el9_7.3.noarch.rpm
MD5: 92ada0a4634ad2a7f280968510def2ab
SHA-256: 2577310175f836f72ee08f1c14de0602ea1d0d6bbcf3bbf9ceb8e1aa66bd5016
Size: 6.11 MB - edk2-tools-20241117-4.el9_7.3.x86_64.rpm
MD5: 1ec673ed50d2b3a8c6ebc1e1f3b1d991
SHA-256: 74c0f4e6ff7008c7654d727f35862c33655fd4e8c2c18e7650ea4e2e4dd0884f
Size: 419.54 kB - edk2-tools-doc-20241117-4.el9_7.3.noarch.rpm
MD5: 5f289f523722bc10cb5144ee6d554df3
SHA-256: fb7303e2384fbadbf9e7ab78bc3819d0d40f97f86e8b91821c242c1e6b84f90f
Size: 92.03 kB