First published: Tue Feb 26 2019(Updated: )
A flaw was found in edk2. When registering a Ram disk whose size is not a multiple of 512 bytes, the BlockIo protocol produced by the RamDiskDxe driver will incur memory read/write overrun. The memory overrun will happen when reading/writing the last block on the Ram disk. Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=1134">https://bugzilla.tianocore.org/show_bug.cgi?id=1134</a> Upstream Patch: <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037248.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037248.html</a> <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037249.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037249.html</a> <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037250.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037250.html</a>
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II | ||
openSUSE Leap | =15.0 | |
debian/edk2 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.05-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12180 is a vulnerability in the BlockIo service for EDK II that may allow an unauthenticated user to potentially enable escalation of privilege, information disclosure, and/or denial of service via network access.
CVE-2018-12180 has a severity score of 8.8 out of 10, indicating a high severity vulnerability.
An unauthenticated user can potentially exploit CVE-2018-12180 through network access, leading to potential privilege escalation, information disclosure, and denial of service.
The EDK II package versions 0~20181115.85588389-3+deb10u3, 2020.11-2+deb11u1, 2022.11-6, and 2023.05-2 in Debian, and version 0~20180205. in Ubuntu Bionic, Ubuntu upstream, and Ubuntu Xenial are affected by CVE-2018-12180.
You can find more information about CVE-2018-12180 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html](http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00046.html), [https://access.redhat.com/errata/RHSA-2019:0809](https://access.redhat.com/errata/RHSA-2019:0809), [https://access.redhat.com/errata/RHSA-2019:0968](https://access.redhat.com/errata/RHSA-2019:0968).