-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2023-e1ffb79ddf 2023-02-16 02:02:01.631002 -------------------------------------------------------------------------------- Name : edk2 Product : Fedora 37 Version : 20221117gitfff6d81270b5 Release : 13.fc37 URL : https://www.tianocore.org Summary : UEFI firmware for 64-bit virtual machines Description : EDK II is a modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications. This package contains sample 64-bit UEFI firmware builds for QEMU and KVM. -------------------------------------------------------------------------------- Update Information: update openssl (CVE-2023-0286, CVE-2023-0215, CVE-2022-4450, CVE-2022-4304). ---- cherry-pick aarch64 bugfixes, set firmware build release date, add ext4 sub-package -------------------------------------------------------------------------------- ChangeLog: * Sat Feb 11 2023 Gerd Hoffmann- 20221117gitfff6d81270b5-13 - update openssl (CVE-2023-0286, CVE-2023-0215, CVE-2022-4450, CVE-2022-4304). * Wed Feb 8 2023 Gerd Hoffmann - 20221117gitfff6d81270b5-12 - cherry-pick aarch64 bugfixes. - set firmware build release date. - add ext4 sub-package. * Fri Jan 6 2023 Gerd Hoffmann - 20221117gitfff6d81270b5-10 - add experimental builds with strict nx checking. -------------------------------------------------------------------------------- References: [ 1 ] Bug #2167874 - CVE-2023-0286 edk2: openssl: X.400 address type confusion in X.509 GeneralName [fedora-37] https://bugzilla.redhat.com/show_bug.cgi?id=2167874 [ 2 ] Bug #2167897 - CVE-2023-0215 edk2: openssl: use-after-free following BIO_new_NDEF [fedora-37] https://bugzilla.redhat.com/show_bug.cgi?id=2167897 [ 3 ] Bug #2167909 - CVE-2022-4450 edk2: openssl: double free after calling PEM_read_bio_ex [fedora-37] https://bugzilla.redhat.com/show_bug.cgi?id=2167909 [ 4 ] Bug #2167925 - CVE-2022-4304 edk2: openssl: timing attack in RSA Decryption implementation [fedora-37] https://bugzilla.redhat.com/show_bug.cgi?id=2167925 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-e1ffb79ddf' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue