https://bugzilla.suse.com/show_bug.cgi?id=1218680 https://bugzilla.suse.com/show_bug.cgi?id=1218680#c2 --- Comment #2 from Joey Lee <jlee@suse.com> --- (In reply to SMASH SMASH from comment #0)
EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-36765 https://www.cve.org/CVERecord?id=CVE-2022-36765 https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx
Upstream experts are still working on the patch in the above EDK2 bug. I will backport it when the patch be merged to edk2 mainline. -- You are receiving this mail because: You are on the CC list for the bug.