Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-36765

Опубликовано: 09 янв. 2024
Источник: debian
EPSS Низкий

Описание

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
edk2fixed2023.11-5package
edk2fixed2022.11-6+deb12u1bookwormpackage
edk2no-dsabusterpackage

Примечания

  • https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx

  • https://bugzilla.tianocore.org/show_bug.cgi?id=4166

  • https://github.com/tianocore/edk2/issues/10299

EPSS

Процентиль: 11%
0.00036
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 лет назад

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

CVSS3: 7
redhat
около 2 лет назад

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

CVSS3: 7
nvd
около 2 лет назад

EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.

CVSS3: 7.8
msrc
почти 2 года назад

Описание отсутствует

suse-cvrf
17 дней назад

Security update for ovmf

EPSS

Процентиль: 11%
0.00036
Низкий