<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for edk2 is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2131</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-09-14</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-09-14</InitialReleaseDate>
		<CurrentReleaseDate>2024-09-14</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-09-14</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">edk2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for edk2 is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">EDK II is a modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications.

Security Fix(es):

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don&apos;t perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain.  So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.(CVE-2024-6119)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for edk2 is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">edk2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2131</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6119</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-6119</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="edk2-aarch64-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-aarch64-202308-10.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="edk2-help-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-help-202308-10.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="edk2-ovmf-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-ovmf-202308-10.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="python3-edk2-devel-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">python3-edk2-devel-202308-10.oe2403.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="edk2-debuginfo-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-debuginfo-202308-10.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="edk2-debugsource-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-debugsource-202308-10.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="edk2-devel-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-devel-202308-10.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="edk2-debuginfo-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-debuginfo-202308-10.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="edk2-debugsource-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-debugsource-202308-10.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="edk2-devel-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-devel-202308-10.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="edk2-202308-10" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">edk2-202308-10.oe2403.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Applications performing certificate name checks (e.g., TLSclients checking server certificates) may attempt to read an invalid memoryaddress resulting in abnormal termination of the application process.Impact summary: Abnormal termination of an application can a cause a denial ofservice.Applications performing certificate name checks (e.g., TLS clients checkingserver certificates) may attempt to read an invalid memory address whencomparing the expected name with an `otherName` subject alternative name of anX.509 certificate. This may result in an exception that terminates theapplication program.Note that basic certificate chain validation (signatures, dates, ...) is notaffected, the denial of service can occur only when the application alsospecifies an expected DNS name, Email address or IP address.TLS servers rarely solicit client certificates, and even when they do, theygenerally don t perform a name check against a reference identifier (expectedidentity), but rather extract the presented identity after checking thecertificate chain.  So TLS servers are generally not affected and the severityof the issue is Moderate.The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.</Note>
		</Notes>
		<ReleaseDate>2024-09-14</ReleaseDate>
		<CVE>CVE-2024-6119</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>edk2 security update</Description>
				<DATE>2024-09-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2131</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>