Search for packages
purl | pkg:deb/debian/edk2@2020.11-2%2Bdeb11u1 |
Tags | Ghost |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2jsu-4abf-aaae
Aliases: CVE-2021-28216 |
BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. |
Affected by 20 other vulnerabilities. Affected by 10 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-5352-njw5-aaaa
Aliases: CVE-2021-38578 |
Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize. |
Affected by 20 other vulnerabilities. Affected by 10 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-5tjt-sq7f-aaaa
Aliases: CVE-2023-45232 |
EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-fd27-e1my-aaas
Aliases: CVE-2023-45229 |
EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-j4d6-r39b-aaac
Aliases: CVE-2023-45230 |
EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-keqz-ek12-aaad
Aliases: CVE-2022-36765 |
EDK2: integer overflow in CreateHob() could lead to HOB OOB R/W |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-kxcj-kecq-aaah
Aliases: CVE-2023-45234 |
EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-pcxk-paj7-aaap
Aliases: CVE-2022-36763 |
EDK2: heap buffer overflow in Tcg2MeasureGptTable() |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-phkd-4f7d-aaaj
Aliases: CVE-2023-45235 |
EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-up29-q45t-aaac
Aliases: CVE-2023-45233 |
EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-x3u3-t2dd-aaah
Aliases: CVE-2022-36764 |
EDK2: heap buffer overflow in Tcg2MeasurePeImage() |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-z8n1-6p1f-aaan
Aliases: CVE-2021-38575 |
NetworkPkg/IScsiDxe has remotely exploitable buffer overflows. |
Affected by 20 other vulnerabilities. Affected by 10 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-zh68-hgen-aaaa
Aliases: CVE-2023-45231 |
EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality. |
Affected by 20 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2024-05-20T14:57:59.533224+00:00 | Debian Importer | Fixing | VCID-x5aj-y3ra-aaac | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:49.225237+00:00 | Debian Importer | Affected by | VCID-phkd-4f7d-aaaj | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:40.280497+00:00 | Debian Importer | Affected by | VCID-kxcj-kecq-aaah | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:36.973811+00:00 | Debian Importer | Affected by | VCID-up29-q45t-aaac | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:27.861241+00:00 | Debian Importer | Affected by | VCID-5tjt-sq7f-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:24.572751+00:00 | Debian Importer | Affected by | VCID-zh68-hgen-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:21.343857+00:00 | Debian Importer | Affected by | VCID-j4d6-r39b-aaac | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-26T05:26:18.173661+00:00 | Debian Importer | Affected by | VCID-fd27-e1my-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T19:07:08.869673+00:00 | Debian Importer | Affected by | VCID-keqz-ek12-aaad | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T19:07:04.901434+00:00 | Debian Importer | Affected by | VCID-x3u3-t2dd-aaah | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T19:07:00.807077+00:00 | Debian Importer | Affected by | VCID-pcxk-paj7-aaap | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T04:00:14.740622+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | None | 34.0.0rc4 |
2024-04-25T04:00:13.887217+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T03:59:56.394876+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-25T03:59:53.084409+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | None | 34.0.0rc4 |
2024-04-24T22:06:09.432306+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T22:06:08.669346+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | None | 34.0.0rc4 |
2024-04-24T22:05:48.992238+00:00 | Debian Importer | Fixing | VCID-rdeh-6rrk-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T22:05:48.202035+00:00 | Debian Importer | Fixing | VCID-rdeh-6rrk-aaas | None | 34.0.0rc4 |
2024-04-24T22:05:28.644315+00:00 | Debian Importer | Fixing | VCID-xmkz-5dcm-aaas | None | 34.0.0rc4 |
2024-04-24T22:05:27.801800+00:00 | Debian Importer | Fixing | VCID-xmkz-5dcm-aaas | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T22:05:11.590094+00:00 | Debian Importer | Fixing | VCID-6dcn-dn58-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T22:05:07.550824+00:00 | Debian Importer | Fixing | VCID-6dcn-dn58-aaaa | None | 34.0.0rc4 |
2024-04-24T14:30:10.139059+00:00 | Debian Importer | Fixing | VCID-61qy-9v85-aaac | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T14:30:09.346311+00:00 | Debian Importer | Fixing | VCID-61qy-9v85-aaac | None | 34.0.0rc4 |
2024-04-24T13:52:20.561515+00:00 | Debian Importer | Fixing | VCID-g9bq-t7jq-aaak | None | 34.0.0rc4 |
2024-04-24T13:52:19.758539+00:00 | Debian Importer | Fixing | VCID-g9bq-t7jq-aaak | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T12:18:13.636015+00:00 | Debian Importer | Fixing | VCID-tq62-2wfd-aaaf | None | 34.0.0rc4 |
2024-04-24T12:18:12.857645+00:00 | Debian Importer | Fixing | VCID-tq62-2wfd-aaaf | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T12:17:52.373309+00:00 | Debian Importer | Fixing | VCID-5avx-9uua-aaah | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T12:17:49.803416+00:00 | Debian Importer | Fixing | VCID-5avx-9uua-aaah | None | 34.0.0rc4 |
2024-04-24T09:05:47.038139+00:00 | Debian Importer | Fixing | VCID-awzn-ghxa-aaam | None | 34.0.0rc4 |
2024-04-24T09:05:46.197721+00:00 | Debian Importer | Fixing | VCID-awzn-ghxa-aaam | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-04-24T09:05:26.607544+00:00 | Debian Importer | Fixing | VCID-vfjp-j7ad-aaaa | None | 34.0.0rc4 |
2024-04-24T09:05:25.787824+00:00 | Debian Importer | Fixing | VCID-vfjp-j7ad-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc4 |
2024-01-11T05:28:29.595414+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-11T05:28:27.801077+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | None | 34.0.0rc2 |
2024-01-11T05:28:21.044763+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-11T05:28:11.963906+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | None | 34.0.0rc2 |
2024-01-10T22:54:53.571838+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc2 |
2024-01-10T22:54:48.128335+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | None | 34.0.0rc2 |
2024-01-04T16:48:17.006962+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T16:48:11.516950+00:00 | Debian Importer | Affected by | VCID-5352-njw5-aaaa | None | 34.0.0rc1 |
2024-01-04T16:48:05.738399+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T16:47:56.798487+00:00 | Debian Importer | Affected by | VCID-z8n1-6p1f-aaan | None | 34.0.0rc1 |
2024-01-04T12:04:28.226634+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | https://security-tracker.debian.org/tracker/data/json | 34.0.0rc1 |
2024-01-04T12:04:15.691028+00:00 | Debian Importer | Affected by | VCID-2jsu-4abf-aaae | None | 34.0.0rc1 |