First published: Wed Jan 10 2024(Updated: )
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability. <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j">https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2257583 is considered critical due to the potential for a heap buffer overflow.
To fix REDHAT-BUG-2257583, you should apply the latest security patches provided by your vendor for the EDK2 software.
REDHAT-BUG-2257583 affects systems using TianoCore EDK2.
Exploitation of REDHAT-BUG-2257583 could lead to a compromise of confidentiality, integrity, and availability.
To prevent exploitation of REDHAT-BUG-2257583, maintain up-to-date software and implement proper network security controls.