Bugzilla – Bug 1183578
VUL-0: CVE-2021-28211: ovmf: edk2: possible heap corruption with LzmaUefiDecompressGetInfo
Last modified: 2024-05-30 18:58:30 UTC
rh#1883529 A flaw was found in edk2 in the decompression process of UEFI images in the LzmaUefiDecompressGetInfo() function. A crafted LZMA header can lead to a heap-based buffer overflow. Upstream PR: https://github.com/tianocore/edk2/pull/1138 Reference: https://bugzilla.tianocore.org/show_bug.cgi?id=1816 https://bugzilla.redhat.com/show_bug.cgi?id=1883529 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28211
The fix is already in Virtualization/ovmf. Will update the tags in changelog. Will also start to backport the patch to SLE.
SUSE-SU-2021:0972-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1183578,1183579 CVE References: CVE-2021-28210,CVE-2021-28211 JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): ovmf-201911-7.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:0987-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1183578,1183579 CVE References: CVE-2021-28210,CVE-2021-28211 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): ovmf-2017+git1510945757.b2662641d5-3.35.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:0495-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1183578,1183579 CVE References: CVE-2021-28210,CVE-2021-28211 JIRA References: Sources used: openSUSE Leap 15.2 (src): ovmf-201911-lp152.6.11.1
SUSE-SU-2021:2117-1: An update that solves three vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1177789,1183578,1183579,1186151 CVE References: CVE-2019-14584,CVE-2021-28210,CVE-2021-28211 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP2-BCL (src): ovmf-2015+git1462940744.321151f-19.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:2161-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1183578,1183579,1186151 CVE References: CVE-2021-28210,CVE-2021-28211 JIRA References: Sources used: SUSE Manager Server 4.0 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Manager Retail Branch Server 4.0 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Manager Proxy 4.0 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise Server for SAP 15 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise Server 15-LTSS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE Enterprise Storage 6 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 SUSE CaaS Platform 4.0 (src): ovmf-2017+git1510945757.b2662641d5-5.43.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.