vulnerability
Oracle Linux: CVE-2022-36763: ELSA-2024-12409: edk2 security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:H/Au:S/C:P/I:P/A:C) | Jan 9, 2024 | Apr 25, 2024 | Jan 9, 2025 |
Severity
5
CVSS
(AV:L/AC:H/Au:S/C:P/I:P/A:C)
Published
Jan 9, 2024
Added
Apr 25, 2024
Modified
Jan 9, 2025
Description
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
A heap buffer overflow flaw was found via the Tcg2MeasureGptTable() function in EDK2, arising from inadequate validation of the GPT Primary Header, presenting a minor risk to confidentiality and integrity. The primary consequence is likely a crash or denial of service. This issue may allow a local attacker to craft a GPT table, causing an integer overflow and consequent buffer overflow.
A heap buffer overflow flaw was found via the Tcg2MeasureGptTable() function in EDK2, arising from inadequate validation of the GPT Primary Header, presenting a minor risk to confidentiality and integrity. The primary consequence is likely a crash or denial of service. This issue may allow a local attacker to craft a GPT table, causing an integer overflow and consequent buffer overflow.
Solution(s)
oracle-linux-upgrade-aavmforacle-linux-upgrade-edk2-aarch64oracle-linux-upgrade-edk2-ovmforacle-linux-upgrade-edk2-toolsoracle-linux-upgrade-edk2-tools-docoracle-linux-upgrade-ovmf

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.