This bug was fixed in the package edk2 - 0~20160408.ffea0a2c-2ubuntu0.1 --------------- edk2 (0~20160408.ffea0a2c-2ubuntu0.1) xenial; urgency=medium
* Security fixes (LP: #1820764): - Fix buffer overflow in BlockIo service (CVE-2018-12180) - DNS: Check received packet size before using (CVE-2018-12178) - Fix stack overflow with corrupted BMP (CVE-2018-12181) * Fix numeric truncation in S3BootScript[Save]*() API. (CVE-2019-14563) * Fix use-after-free in PcdHiiOsRuntimeSupport. (CVE-2019-14586) * Clear memory before free to avoid potential password leak. (CVE-2019-14558) * Fix double-unmap in SdMmcCreateTrb(). This did not impact any of the images built from this package. (CVE-2019-14587) * Fix memory leak in ArpOnFrameRcvdDpc(). (CVE-2019-14559) * Fix issue that could allow an efi image with a blacklisted hash in the dbx to be loaded. (CVE-2019-14575) * Fix a memory leak in the ARP handler. (CVE-2019-14559) -- dann frazier <da...@ubuntu.com> Thu, 16 Apr 2020 09:05:29 -0600 ** Changed in: edk2 (Ubuntu Xenial) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14558 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14559 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14563 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14575 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14586 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-14587 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1820764 Title: CVE-2018-12178 CVE-2018-12180 CVE-2018-12181 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/1820764/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs