{"schema_version":"1.7.2","id":"OESA-2026-2161","modified":"2026-05-03T09:56:48Z","published":"2026-05-03T09:56:48Z","upstream":["CVE-2026-31790"],"summary":"edk2 security update","details":"EDK II is a modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications.\r\n\r\nSecurity Fix(es):\n\nIssue summary: Applications using RSASVE key encapsulation to establish\na secret encryption key can send contents of an uninitialized memory buffer to\na malicious peer.\n\nImpact summary: The uninitialized buffer might contain sensitive data from the\nprevious execution of the application process which leads to sensitive data\nleakage to an attacker.\n\nRSA_public_encrypt() returns the number of bytes written on success and -1\non error. The affected code tests only whether the return value is non-zero.\nAs a result, if RSA encryption fails, encapsulation can still return success to\nthe caller, set the output lengths, and leave the caller to use the contents of\nthe ciphertext buffer as if a valid KEM ciphertext had been produced.\n\nIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\nattacker-supplied invalid RSA public key without first validating that key,\nthen this may cause stale or uninitialized contents of the caller-provided\nciphertext buffer to be disclosed to the attacker in place of the KEM\nciphertext.\n\nAs a workaround calling EVP_PKEY_public_check() or\nEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\nthe issue.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.(CVE-2026-31790)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"edk2","purl":"pkg:rpm/openEuler/edk2&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"202308-37.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["edk2-debuginfo-202308-37.oe2403sp3.aarch64.rpm","edk2-debugsource-202308-37.oe2403sp3.aarch64.rpm","edk2-devel-202308-37.oe2403sp3.aarch64.rpm"],"noarch":["edk2-aarch64-202308-37.oe2403sp3.noarch.rpm","edk2-help-202308-37.oe2403sp3.noarch.rpm","edk2-ovmf-202308-37.oe2403sp3.noarch.rpm","python3-edk2-devel-202308-37.oe2403sp3.noarch.rpm"],"src":["edk2-202308-37.oe2403sp3.src.rpm"],"x86_64":["edk2-debuginfo-202308-37.oe2403sp3.x86_64.rpm","edk2-debugsource-202308-37.oe2403sp3.x86_64.rpm","edk2-devel-202308-37.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2161"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31790"}],"database_specific":{"severity":"High"}}
