Search for packages
| purl | pkg:deb/debian/edk2@2022.11-6%2Bdeb12u1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-5czu-f7hq-v3bf | edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message |
CVE-2023-45229
|
| VCID-9j1j-68kv-ufhn | EDK2: heap buffer overflow in Tcg2MeasureGptTable() |
CVE-2022-36763
|
| VCID-fxxz-zj2j-1qdz | edk2: Infinite loop when parsing a PadN option in the Destination Options header |
CVE-2023-45233
|
| VCID-h4uc-8m6s-ffhy | edk2: Infinite loop when parsing unknown options in the Destination Options header |
CVE-2023-45232
|
| VCID-ha36-4zhr-mfcu | edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message |
CVE-2023-45234
|
| VCID-hme1-vqbr-qydz | EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W |
CVE-2022-36765
|
| VCID-k7n3-f3ej-tqa9 | edk2: edk2: UEFI Shell access in Secure Boot environments allows bypass of Secure Boot constraints |
CVE-2025-2486
|
| VCID-u9mt-wbe7-yfb6 | edk2: Buffer overflow in the DHCPv6 client via a long Server ID option |
CVE-2023-45230
|
| VCID-v17c-bytr-6qe4 | edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message |
CVE-2023-45235
|
| VCID-w7z8-86tz-87eb | edk2: Out of Bounds read when handling a ND Redirect message with truncated options |
CVE-2023-45231
|
| VCID-x5x7-rwjh-wbb7 | EDK2: heap buffer overflow in Tcg2MeasurePeImage() |
CVE-2022-36764
|
| VCID-yyqe-rr6t-c3hd | security update |
CVE-2023-48733
|