First published: Tue Jan 09 2024(Updated: )
EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
Credit: infosec@edk2.groups.io infosec@edk2.groups.io
Affected Software | Affected Version | How to fix |
---|---|---|
debian/edk2 | <=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6 | 2022.11-6+deb12u1 2024.02-2 |
ubuntu/edk2 | <0~20191122. | 0~20191122. |
ubuntu/edk2 | <2022.02-3ubuntu0.22.04.2 | 2022.02-3ubuntu0.22.04.2 |
ubuntu/edk2 | <2023.05-2ubuntu0.1 | 2023.05-2ubuntu0.1 |
Tianocore EDK II | <=202311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36765 has a critical severity rating due to the potential for integrity, confidentiality, and availability compromise.
To fix CVE-2022-36765, upgrade to the affected software versions provided by your OS vendor, such as EDK2 versions 2022.11-6+deb12u1 or later.
CVE-2022-36765 affects multiple versions of the Tianocore EDK2 and specific packages in Ubuntu and Debian distributions.
Yes, CVE-2022-36765 can be exploited via a local network, allowing attackers to potentially execute malicious code.
Successful exploitation of CVE-2022-36765 may lead to unauthorized access and manipulation of system data, affecting the overall system security.