[Bug 1218678] New: VUL-0: CVE-2022-36763: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of co ...
https://bugzilla.suse.com/show_bug.cgi?id=1218678 Bug ID: 1218678 Summary: VUL-0: CVE-2022-36763: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of co ... Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/390488/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: guillaume.gardet@opensuse.org Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: stoyan.manolov@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36763 https://www.cve.org/CVERecord?id=CVE-2022-36763 https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1218678
Maintenance Automation
https://bugzilla.suse.com/show_bug.cgi?id=1218678
Stoyan Manolov
https://bugzilla.suse.com/show_bug.cgi?id=1218678
Stoyan Manolov
https://bugzilla.suse.com/show_bug.cgi?id=1218678
https://bugzilla.suse.com/show_bug.cgi?id=1218678#c2
--- Comment #2 from Joey Lee
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36763 https://www.cve.org/CVERecord?id=CVE-2022-36763 https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr
I will backport patch in the above edk2 bug after it be merged to edk2 mainline. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1218678
SMASH SMASH
https://bugzilla.suse.com/show_bug.cgi?id=1218678
https://bugzilla.suse.com/show_bug.cgi?id=1218678#c3
--- Comment #3 from Joey Lee
(In reply to SMASH SMASH from comment #0)
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36763 https://www.cve.org/CVERecord?id=CVE-2022-36763 https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr
I will backport patch in the above edk2 bug after it be merged to edk2 mainline.
Those patches be merged to edk2 mainline. I will backport them. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1218678
Stoyan Manolov
https://bugzilla.suse.com/show_bug.cgi?id=1218678
https://bugzilla.suse.com/show_bug.cgi?id=1218678#c5
--- Comment #5 from Joey Lee
https://bugzilla.suse.com/show_bug.cgi?id=1218678
https://bugzilla.suse.com/show_bug.cgi?id=1218678#c6
--- Comment #6 from Joey Lee
participants (1)
-
bugzilla_noreply@suse.com