-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: edk2 security, bug fix, and enhancement update
Advisory ID:       RHSA-2021:4198-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:4198
Issue date:        2021-11-09
CVE Names:         CVE-2021-23840 CVE-2021-23841 
====================================================================
1. Summary:

An update for edk2 is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - noarch

3. Description:

EDK (Embedded Development Kit) is a project to enable UEFI support for
Virtual Machines. This package contains a sample 64-bit UEFI firmware for
QEMU and KVM. 

The following packages have been upgraded to a later upstream version: edk2
(20210527gite1999b264f1f). (BZ#1846481, BZ#1938238)

Security Fix(es):

* openssl: integer overflow in CipherUpdate (CVE-2021-23840)

* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
1937564 - [RFE] support VCPU hot unplug in OVMF/edk2
1938238 - rebase edk2 to edk2-stable202105 for RHEL-8.5
1938257 - refresh OpenSSL bundled with edk2 for RHEL-8.5
1956837 - Additional build of edk2 without SMM (dual build / sub-package) for SEV-ES
1988762 - edk2 does not ignore PMBR protective record BootIndicator as required by UEFI spec

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
edk2-20210527gite1999b264f1f-3.el8.src.rpm

noarch:
edk2-aarch64-20210527gite1999b264f1f-3.el8.noarch.rpm
edk2-ovmf-20210527gite1999b264f1f-3.el8.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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gMnA
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-4198:03 Moderate: edk2 security, bug fix,

An update for edk2 is now available for Red Hat Enterprise Linux 8

Summary

EDK (Embedded Development Kit) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
The following packages have been upgraded to a later upstream version: edk2 (20210527gite1999b264f1f). (BZ#1846481, BZ#1938238)
Security Fix(es):
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-23840 https://access.redhat.com/security/cve/CVE-2021-23841 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: edk2-20210527gite1999b264f1f-3.el8.src.rpm
noarch: edk2-aarch64-20210527gite1999b264f1f-3.el8.noarch.rpm edk2-ovmf-20210527gite1999b264f1f-3.el8.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:4198-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:4198
Issued Date: : 2021-11-09
CVE Names: CVE-2021-23840 CVE-2021-23841

Topic

An update for edk2 is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - noarch


Bugs Fixed

1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()

1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate

1937564 - [RFE] support VCPU hot unplug in OVMF/edk2

1938238 - rebase edk2 to edk2-stable202105 for RHEL-8.5

1938257 - refresh OpenSSL bundled with edk2 for RHEL-8.5

1956837 - Additional build of edk2 without SMM (dual build / sub-package) for SEV-ES

1988762 - edk2 does not ignore PMBR protective record BootIndicator as required by UEFI spec


Related News