VYPR

rpm package

opensuse/ovmf&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/ovmf&distro=openSUSE%20Tumbleweed

Vulnerabilities (38)

  • CVE-2026-34874HigApr 1, 2026
    affected < 202602-9.1fixed 202602-9.1

    An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a NULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0.

  • CVE-2026-25833HigApr 1, 2026
    affected < 202602-9.1fixed 202602-9.1

    Mbed TLS 3.5.0 to 3.6.5 fixed in 3.6.6 and 4.1.0 has a buffer overflow in the x509_inet_pton_ipv6() function

  • CVE-2025-2296HigDec 9, 2025
    affected < 202602-6.1fixed 202602-6.1

    EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentialit

  • CVE-2025-59438Oct 21, 2025
    affected < 202602-5.1fixed 202602-5.1

    Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.

  • CVE-2024-38805MedAug 12, 2025
    affected < 202505-2.1fixed 202505-2.1

    EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service.

  • CVE-2024-38797MedApr 7, 2025
    affected < 202505-2.1fixed 202505-2.1

    EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via an adjecent network. A successful exploit of this vulnerability may lead to a loss of Integrity and/or Availability.

  • CVE-2024-25742MedMay 17, 2024
    affected < 202405-1.1fixed 202405-1.1

    In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.

  • CVE-2023-48733Feb 14, 2024
    affected < 202308-7.1fixed 202308-7.1

    An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.

  • CVE-2023-45234Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integri

  • CVE-2023-45232Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

  • CVE-2023-45235Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidential

  • CVE-2023-45237Jan 16, 2024
    affected < 202405-1.1fixed 202405-1.1

    EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

  • CVE-2023-45236Jan 16, 2024
    affected < 202405-1.1fixed 202405-1.1

    EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

  • CVE-2023-45231Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing  Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.

  • CVE-2023-45230Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability

  • CVE-2023-45229Jan 16, 2024
    affected < 202402-1.1fixed 202402-1.1

    EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentialit

  • CVE-2022-36764Jan 9, 2024
    affected < 202308-9.1fixed 202308-9.1

    EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

  • CVE-2022-36763Jan 9, 2024
    affected < 202308-9.1fixed 202308-9.1

    EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

  • CVE-2021-38578Mar 3, 2022
    affected < 202211-1.1fixed 202211-1.1

    Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.

  • CVE-2021-28211Jun 11, 2021
    affected < 202105-3.4fixed 202105-3.4

    A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.

Page 1 of 2