(In reply to Joey Lee from comment #2) > (In reply to SMASH SMASH from comment #0) > > EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() > > function, allowing a user to trigger a heap buffer overflow via a local > > network. Successful exploitation of this vulnerability may result in a > > compromise of confidentiality, integrity, and/or availability. > > > > References: > > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36763 > > https://www.cve.org/CVERecord?id=CVE-2022-36763 > > https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr > > I will backport patch in the above edk2 bug after it be merged to edk2 > mainline. Those patches be merged to edk2 mainline. I will backport them.