Comment # 2 on bug 1218679 from Joey Lee
(In reply to SMASH SMASH from comment #0)
> EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function,
> allowing a user to trigger a heap buffer overflow via a local network.
> Successful exploitation of this vulnerability may result in a compromise of
> confidentiality, integrity, and/or availability.
> 
> References:
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36764
> https://www.cve.org/CVERecord?id=CVE-2022-36764
> https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j

The patch in the above edk2 bug is still under reviewing. I will backport the
patch after it be merged to edk2 mainline.


You are receiving this mail because: