diff options
| author | Soumya Sambu <soumya.sambu@windriver.com> | 2024-08-02 03:44:49 +0000 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-12-09 07:54:03 -0800 |
| commit | e8a9aac72d6336aa5e8b2782676bd6015b1c3fde (patch) | |
| tree | 910b184cbbcc6fe6c02d0625bcf36dc6fc07b60a /meta/recipes-core/ovmf/ovmf_git.bb | |
| parent | dd8ed68222f9249766bb4c376833d7d63d601c41 (diff) | |
| download | poky-e8a9aac72d6336aa5e8b2782676bd6015b1c3fde.tar.gz | |
ovmf: Fix CVE-2022-36765
EDK2 is susceptible to a vulnerability in the CreateHob() function,
allowing a user to trigger a integer overflow to buffer overflow
via a local network. Successful exploitation of this vulnerability
may result in a compromise of confidentiality, integrity, and/or
availability.
References:
https://nvd.nist.gov/vuln/detail/CVE-2022-36765
Upstream-patches:
https://github.com/tianocore/edk2/commit/59f024c76ee57c2bec84794536302fc770cd6ec2
https://github.com/tianocore/edk2/commit/aeaee8944f0eaacbf4cdf39279785b9ba4836bb6
https://github.com/tianocore/edk2/commit/9a75b030cf27d2530444e9a2f9f11867f79bf679
(From OE-Core rev: 260fc2182e6a83d7c93b2e8efd95255cd9168a79)
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-core/ovmf/ovmf_git.bb')
| -rw-r--r-- | meta/recipes-core/ovmf/ovmf_git.bb | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb index dbfed086e4..1dba709824 100644 --- a/meta/recipes-core/ovmf/ovmf_git.bb +++ b/meta/recipes-core/ovmf/ovmf_git.bb | |||
| @@ -50,6 +50,9 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \ | |||
| 50 | file://CVE-2023-45237-0001.patch \ | 50 | file://CVE-2023-45237-0001.patch \ |
| 51 | file://CVE-2023-45237-0002.patch \ | 51 | file://CVE-2023-45237-0002.patch \ |
| 52 | file://CVE-2023-45236.patch \ | 52 | file://CVE-2023-45236.patch \ |
| 53 | file://CVE-2022-36765-0001.patch \ | ||
| 54 | file://CVE-2022-36765-0002.patch \ | ||
| 55 | file://CVE-2022-36765-0003.patch \ | ||
| 53 | " | 56 | " |
| 54 | 57 | ||
| 55 | PV = "edk2-stable202202" | 58 | PV = "edk2-stable202202" |
