First published: Wed Jan 10 2024(Updated: )
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability. <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr">https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2257582 is critical due to the potential for a heap buffer overflow that can compromise confidentiality, integrity, and availability.
To fix REDHAT-BUG-2257582, update to the latest version of TianoCore EDK2 that addresses this vulnerability.
The vulnerability REDHAT-BUG-2257582 is caused by a heap buffer overflow in the Tcg2MeasureGptTable() function.
Yes, REDHAT-BUG-2257582 can potentially be exploited via a local network by an attacker.
The impact of REDHAT-BUG-2257582 can include compromised confidentiality, integrity, and availability of the affected system.