Latest tianocore edk ii Vulnerabilities

Buffer Overflow in EDK II Network Package
Tianocore EDK II
ubuntu/edk2<0~20191122.
ubuntu/edk2<2022.02-3ubuntu0.22.04.2
ubuntu/edk2<2023.05-2ubuntu0.1
Tianocore EDK2<=202311
debian/edk2<=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6
and 1 more
Buffer Overflow in EDK II Network Package
Tianocore EDK II
ubuntu/edk2<2023.05-2ubuntu0.1
ubuntu/edk2<0~20191122.
ubuntu/edk2<2022.02-3ubuntu0.22.04.2
Tianocore EDK2<=202311
debian/edk2<=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6
and 1 more
BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE.
Tianocore EDK II
Insufficient input validation in MdeModulePkg in EDKII may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical acc...
Tianocore EDK II
Stack overflow in DxeCore for EDK II may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
Tianocore EDK II
Insufficient memory write check in SMM service for EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local acces...
Tianocore EDK II
Improper configuration in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via local access.
Tianocore EDK II
Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.
ubuntu/edk2<0~20180205.
ubuntu/edk2<0~20181115.85588389-3
ubuntu/edk2<0~20160408.
Tianocore EDK II
debian/edk2
A stack buffer overflow was found in edk2 when the HII database contains a Bitmap who claims as 4-bit or 8-bit per pixel, but the palette contains more than 16(2^4) or 256(2^8) colors. Upstream issue...
redhat/ovmf<0:20180508-6.gitee3198e672e2.el7
redhat/edk2<0:20190308git89910a39dcfd-6.el8
ubuntu/edk2<0~20180205.
ubuntu/edk2<0~20181115.85588389-3
ubuntu/edk2<0~20160408.
Tianocore EDK II
and 1 more
A flaw was found in edk2. When registering a Ram disk whose size is not a multiple of 512 bytes, the BlockIo protocol produced by the RamDiskDxe driver will incur memory read/write overrun. The memory...
ubuntu/edk2<0~20180205.
ubuntu/edk2<0~20181115.85588389-3
ubuntu/edk2<0~20160408.
Tianocore EDK II
openSUSE Leap=15.0
debian/edk2
Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.
redhat/ovmf<0:20180508-6.gitee3198e672e2.el7
redhat/edk2<0:20190308git89910a39dcfd-6.el8
Tianocore EDK II
openSUSE Leap=15.0
Fedoraproject Fedora=30
Redhat Enterprise Linux=8.0
and 8 more
A logic error in MdeModulePkg in EDK II firmware may allow authenticated user to potentially bypass configuration access controls and escalate privileges via local access. External Reference: <a hr...
redhat/ovmf<0:20180508-6.gitee3198e672e2.el7
Tianocore EDK II=udk2015
Tianocore EDK II=udk2017
Tianocore EDK II=udk2018
Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.
redhat/ovmf<0:20180508-6.gitee3198e672e2.el7
redhat/edk2<0:20190308git89910a39dcfd-6.el8
redhat/imgbased<0:1.1.9-0.1.el7e
redhat/ovirt-node-ng<0:4.3.5-0.20190717.0.el7e
redhat/redhat-release-virtualization-host<0:4.3.5-2.el7e
redhat/redhat-virtualization-host<0:4.3.5-20190722.0.el7_7
and 1 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203