summaryrefslogtreecommitdiffstats
path: root/scripts/lib/checklayer/__init__.py
diff options
context:
space:
mode:
authorHongxu Jia <hongxu.jia@windriver.com>2025-06-12 20:43:17 -0700
committerRichard Purdie <richard.purdie@linuxfoundation.org>2025-06-16 17:57:29 +0100
commitc169e5d26a0d7d377d1b985543a715cab169c55c (patch)
treec2499c273b68fb4181d06d77e49a6d2c49379e6b /scripts/lib/checklayer/__init__.py
parent6ed03701e37b460810a3702cd5b5798c104abcc0 (diff)
downloadpoky-c169e5d26a0d7d377d1b985543a715cab169c55c.tar.gz
ovmf: fix CVE-2024-38797
According to [1]: EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via an adjecent network. A successful exploit of this vulnerability may lead to a loss of Integrity and/or Availability. Backport fixes from upstream edk2 [2][3] [1] https://nvd.nist.gov/vuln/detail/CVE-2024-38797 [2] https://github.com/tianocore/edk2/security/advisories/GHSA-4wjw-6xmf-44xf [3] https://github.com/tianocore/edk2/pull/10928 (From OE-Core rev: a94550098d821e0055020a7d866648a761efcade) Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/lib/checklayer/__init__.py')
0 files changed, 0 insertions, 0 deletions