Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 921729 (CVE-2022-36763, CVE-2022-36764, CVE-2022-36765) - sys-firmware/edk2-ovmf{,-bin}: multiple vulnerabilities
Summary: sys-firmware/edk2-ovmf{,-bin}: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2022-36763, CVE-2022-36764, CVE-2022-36765
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/tianocore/edk2/sec...
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-01-10 23:22 UTC by Christopher Fore
Modified: 2024-01-10 23:28 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-01-10 23:22:07 UTC
CVE-2022-36763 (https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr):

EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

CVE-2022-36764 (https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j):

EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

CVE-2022-36765 (https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx):

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.


The above are planned to be fixed in their February 2024 release with a patch available here:

https://bugzilla.tianocore.org/show_bug.cgi?id=4117
Comment 1 Christopher Fore 2024-01-10 23:28:48 UTC
Oops I forgot to specify patches and their relevant CVEs:

CVE-2022-36763 patch: https://bugzilla.tianocore.org/show_bug.cgi?id=4117

CVE-2022-36764 patch: https://bugzilla.tianocore.org/show_bug.cgi?id=4118

CVE-2022-36765 patch: https://bugzilla.tianocore.org/show_bug.cgi?id=4166