{"schema_version":"1.7.2","id":"OESA-2026-1664","modified":"2026-03-20T14:24:49Z","published":"2026-03-20T14:24:49Z","upstream":["CVE-2025-69419"],"summary":"edk2 security update","details":"EDK II is a modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications.\r\n\r\nSecurity Fix(es):\n\nIssue summary: Calling PKCS12_get_friendlyname() function on a maliciously\ncrafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing\nnon-ASCII BMP code point can trigger a one byte write before the allocated\nbuffer.\n\nImpact summary: The out-of-bounds write can cause a memory corruption\nwhich can have various consequences including a Denial of Service.\n\nThe OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12\nBMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,\nthe helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16\nsource byte count as the destination buffer capacity to UTF8_putc(). For BMP\ncode points above U+07FF, UTF-8 requires three bytes, but the forwarded\ncapacity can be just two bytes. UTF8_putc() then returns -1, and this negative\nvalue is added to the output length without validation, causing the\nlength to become negative. The subsequent trailing NUL byte is then written\nat a negative offset, causing write outside of heap allocated buffer.\n\nThe vulnerability is reachable via the public PKCS12_get_friendlyname() API\nwhen parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a\ndifferent code path that avoids this issue, PKCS12_get_friendlyname() directly\ninvokes the vulnerable function. Exploitation requires an attacker to provide\na malicious PKCS#12 file to be parsed by the application and the attacker\ncan just trigger a one zero byte write before the allocated buffer.\nFor that reason the issue was assessed as Low severity according to our\nSecurity Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.\n\nOpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.\n\nOpenSSL 1.0.2 is not affected by this issue.(CVE-2025-69419)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"edk2","purl":"pkg:rpm/openEuler/edk2&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"202308-31.oe2403"}]}],"ecosystem_specific":{"aarch64":["edk2-debuginfo-202308-31.oe2403.aarch64.rpm","edk2-debugsource-202308-31.oe2403.aarch64.rpm","edk2-devel-202308-31.oe2403.aarch64.rpm"],"noarch":["edk2-aarch64-202308-31.oe2403.noarch.rpm","edk2-help-202308-31.oe2403.noarch.rpm","edk2-ovmf-202308-31.oe2403.noarch.rpm","python3-edk2-devel-202308-31.oe2403.noarch.rpm"],"src":["edk2-202308-31.oe2403.src.rpm"],"x86_64":["edk2-debuginfo-202308-31.oe2403.x86_64.rpm","edk2-debugsource-202308-31.oe2403.x86_64.rpm","edk2-devel-202308-31.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1664"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-69419"}],"database_specific":{"severity":"High"}}
