RHSA-2019:3338 - Security Advisory
Moderate: edk2 security, bug fix, and enhancement update
Security Advisory: Moderate
An update for edk2 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
- edk2: Stack buffer overflow with corrupted BMP (CVE-2018-12181)
- edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media (CVE-2019-0160)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
For details on how to apply this update, which includes the changes described in this advisory, refer to:
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- BZ - 1666941 - UEFI guest cannot boot into os when setting some special memory size
- BZ - 1686783 - CVE-2018-12181 edk2: Stack buffer overflow with corrupted BMP
- BZ - 1687731 - rebase edk2 to upstream tag edk2-stable201903 for RHEL-8.1
- BZ - 1691640 - CVE-2019-0160 edk2: Buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media
- BZ - 1693205 - edk2: Enable TPM2 support
- BZ - 1714446 - edk2-aarch64 silent build is not silent enough
Red Hat Enterprise Linux for x86_64 8
Red Hat Enterprise Linux for ARM 64 8