summaryrefslogtreecommitdiffstats
path: root/meta
diff options
context:
space:
mode:
Diffstat (limited to 'meta')
-rw-r--r--meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0001.patch179
-rw-r--r--meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0002.patch157
-rw-r--r--meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0003.patch135
-rw-r--r--meta/recipes-core/ovmf/ovmf_git.bb3
4 files changed, 474 insertions, 0 deletions
diff --git a/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0001.patch b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0001.patch
new file mode 100644
index 0000000000..120cf66f6a
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0001.patch
@@ -0,0 +1,179 @@
1From 59f024c76ee57c2bec84794536302fc770cd6ec2 Mon Sep 17 00:00:00 2001
2From: Gua Guo <gua.guo@intel.com>
3Date: Thu, 11 Jan 2024 13:01:19 +0800
4Subject: [PATCH] UefiPayloadPkg/Hob: Integer Overflow in CreateHob()
5
6REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4166
7
8Fix integer overflow in various CreateHob instances.
9Fixes: CVE-2022-36765
10
11The CreateHob() function aligns the requested size to 8
12performing the following operation:
13```
14HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
15```
16
17No checks are performed to ensure this value doesn't
18overflow, and could lead to CreateHob() returning a smaller
19HOB than requested, which could lead to OOB HOB accesses.
20
21Reported-by: Marc Beatove <mbeatove@google.com>
22Cc: Guo Dong <guo.dong@intel.com>
23Cc: Sean Rhodes <sean@starlabs.systems>
24Cc: James Lu <james.lu@intel.com>
25Reviewed-by: Gua Guo <gua.guo@intel.com>
26Cc: John Mathew <john.mathews@intel.com>
27Authored-by: Gerd Hoffmann <kraxel@redhat.com>
28Signed-off-by: Gua Guo <gua.guo@intel.com>
29
30CVE: CVE-2022-36765
31
32Upstream-Status: Backport [https://github.com/tianocore/edk2/commit/59f024c76ee57c2bec84794536302fc770cd6ec2]
33
34Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
35---
36 .../Library/PayloadEntryHobLib/Hob.c | 43 +++++++++++++++++++
37 .../UefiPayloadEntry/UniversalPayloadEntry.c | 8 ++--
38 2 files changed, 48 insertions(+), 3 deletions(-)
39
40diff --git a/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c b/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c
41index 2c3acbbc19..51c2e28d7d 100644
42--- a/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c
43+++ b/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c
44@@ -110,6 +110,13 @@ CreateHob (
45
46 HandOffHob = GetHobList ();
47
48+ //
49+ // Check Length to avoid data overflow.
50+ //
51+ if (HobLength > MAX_UINT16 - 0x7) {
52+ return NULL;
53+ }
54+
55 HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
56
57 FreeMemory = HandOffHob->EfiFreeMemoryTop - HandOffHob->EfiFreeMemoryBottom;
58@@ -160,6 +167,9 @@ BuildResourceDescriptorHob (
59
60 Hob = CreateHob (EFI_HOB_TYPE_RESOURCE_DESCRIPTOR, sizeof (EFI_HOB_RESOURCE_DESCRIPTOR));
61 ASSERT (Hob != NULL);
62+ if (Hob == NULL) {
63+ return;
64+ }
65
66 Hob->ResourceType = ResourceType;
67 Hob->ResourceAttribute = ResourceAttribute;
68@@ -330,6 +340,10 @@ BuildModuleHob (
69 );
70
71 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION_MODULE));
72+ ASSERT (Hob != NULL);
73+ if (Hob == NULL) {
74+ return;
75+ }
76
77 CopyGuid (&(Hob->MemoryAllocationHeader.Name), &gEfiHobMemoryAllocModuleGuid);
78 Hob->MemoryAllocationHeader.MemoryBaseAddress = MemoryAllocationModule;
79@@ -378,6 +392,11 @@ BuildGuidHob (
80 ASSERT (DataLength <= (0xffff - sizeof (EFI_HOB_GUID_TYPE)));
81
82 Hob = CreateHob (EFI_HOB_TYPE_GUID_EXTENSION, (UINT16)(sizeof (EFI_HOB_GUID_TYPE) + DataLength));
83+ ASSERT (Hob != NULL);
84+ if (Hob == NULL) {
85+ return NULL;
86+ }
87+
88 CopyGuid (&Hob->Name, Guid);
89 return Hob + 1;
90 }
91@@ -441,6 +460,10 @@ BuildFvHob (
92 EFI_HOB_FIRMWARE_VOLUME *Hob;
93
94 Hob = CreateHob (EFI_HOB_TYPE_FV, sizeof (EFI_HOB_FIRMWARE_VOLUME));
95+ ASSERT (Hob != NULL);
96+ if (Hob == NULL) {
97+ return;
98+ }
99
100 Hob->BaseAddress = BaseAddress;
101 Hob->Length = Length;
102@@ -472,6 +495,10 @@ BuildFv2Hob (
103 EFI_HOB_FIRMWARE_VOLUME2 *Hob;
104
105 Hob = CreateHob (EFI_HOB_TYPE_FV2, sizeof (EFI_HOB_FIRMWARE_VOLUME2));
106+ ASSERT (Hob != NULL);
107+ if (Hob == NULL) {
108+ return;
109+ }
110
111 Hob->BaseAddress = BaseAddress;
112 Hob->Length = Length;
113@@ -513,6 +540,10 @@ BuildFv3Hob (
114 EFI_HOB_FIRMWARE_VOLUME3 *Hob;
115
116 Hob = CreateHob (EFI_HOB_TYPE_FV3, sizeof (EFI_HOB_FIRMWARE_VOLUME3));
117+ ASSERT (Hob != NULL);
118+ if (Hob == NULL) {
119+ return;
120+ }
121
122 Hob->BaseAddress = BaseAddress;
123 Hob->Length = Length;
124@@ -546,6 +577,10 @@ BuildCpuHob (
125 EFI_HOB_CPU *Hob;
126
127 Hob = CreateHob (EFI_HOB_TYPE_CPU, sizeof (EFI_HOB_CPU));
128+ ASSERT (Hob != NULL);
129+ if (Hob == NULL) {
130+ return;
131+ }
132
133 Hob->SizeOfMemorySpace = SizeOfMemorySpace;
134 Hob->SizeOfIoSpace = SizeOfIoSpace;
135@@ -583,6 +618,10 @@ BuildStackHob (
136 );
137
138 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION_STACK));
139+ ASSERT (Hob != NULL);
140+ if (Hob == NULL) {
141+ return;
142+ }
143
144 CopyGuid (&(Hob->AllocDescriptor.Name), &gEfiHobMemoryAllocStackGuid);
145 Hob->AllocDescriptor.MemoryBaseAddress = BaseAddress;
146@@ -664,6 +703,10 @@ BuildMemoryAllocationHob (
147 );
148
149 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION));
150+ ASSERT (Hob != NULL);
151+ if (Hob == NULL) {
152+ return;
153+ }
154
155 ZeroMem (&(Hob->AllocDescriptor.Name), sizeof (EFI_GUID));
156 Hob->AllocDescriptor.MemoryBaseAddress = BaseAddress;
157diff --git a/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.c b/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.c
158index edb3c20471..abfe75bd7b 100644
159--- a/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.c
160+++ b/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.c
161@@ -111,10 +111,12 @@ AddNewHob (
162 }
163
164 NewHob.Header = CreateHob (Hob->Header->HobType, Hob->Header->HobLength);
165-
166- if (NewHob.Header != NULL) {
167- CopyMem (NewHob.Header + 1, Hob->Header + 1, Hob->Header->HobLength - sizeof (EFI_HOB_GENERIC_HEADER));
168+ ASSERT (NewHob.Header != NULL);
169+ if (NewHob.Header == NULL) {
170+ return;
171 }
172+
173+ CopyMem (NewHob.Header + 1, Hob->Header + 1, Hob->Header->HobLength - sizeof (EFI_HOB_GENERIC_HEADER));
174 }
175
176 /**
177--
1782.40.0
179
diff --git a/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0002.patch b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0002.patch
new file mode 100644
index 0000000000..1209be27b5
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0002.patch
@@ -0,0 +1,157 @@
1From aeaee8944f0eaacbf4cdf39279785b9ba4836bb6 Mon Sep 17 00:00:00 2001
2From: Gua Guo <gua.guo@intel.com>
3Date: Thu, 11 Jan 2024 13:07:50 +0800
4Subject: [PATCH] EmbeddedPkg/Hob: Integer Overflow in CreateHob()
5
6REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4166
7
8Fix integer overflow in various CreateHob instances.
9Fixes: CVE-2022-36765
10
11The CreateHob() function aligns the requested size to 8
12performing the following operation:
13```
14HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
15```
16
17No checks are performed to ensure this value doesn't
18overflow, and could lead to CreateHob() returning a smaller
19HOB than requested, which could lead to OOB HOB accesses.
20
21Reported-by: Marc Beatove <mbeatove@google.com>
22Cc: Leif Lindholm <quic_llindhol@quicinc.com>
23Reviewed-by: Ard Biesheuvel <ardb+tianocore@kernel.org>
24Cc: Abner Chang <abner.chang@amd.com>
25Cc: John Mathew <john.mathews@intel.com>
26Authored-by: Gerd Hoffmann <kraxel@redhat.com>
27Signed-off-by: Gua Guo <gua.guo@intel.com>
28
29CVE: CVE-2022-36765
30
31Upstream-Status: Backport [https://github.com/tianocore/edk2/commit/aeaee8944f0eaacbf4cdf39279785b9ba4836bb6]
32
33Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
34---
35 EmbeddedPkg/Library/PrePiHobLib/Hob.c | 43 +++++++++++++++++++++++++++
36 1 file changed, 43 insertions(+)
37
38diff --git a/EmbeddedPkg/Library/PrePiHobLib/Hob.c b/EmbeddedPkg/Library/PrePiHobLib/Hob.c
39index 8eb175aa96..cbc35152cc 100644
40--- a/EmbeddedPkg/Library/PrePiHobLib/Hob.c
41+++ b/EmbeddedPkg/Library/PrePiHobLib/Hob.c
42@@ -110,6 +110,13 @@ CreateHob (
43
44 HandOffHob = GetHobList ();
45
46+ //
47+ // Check Length to avoid data overflow.
48+ //
49+ if (HobLength > MAX_UINT16 - 0x7) {
50+ return NULL;
51+ }
52+
53 HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
54
55 FreeMemory = HandOffHob->EfiFreeMemoryTop - HandOffHob->EfiFreeMemoryBottom;
56@@ -160,6 +167,9 @@ BuildResourceDescriptorHob (
57
58 Hob = CreateHob (EFI_HOB_TYPE_RESOURCE_DESCRIPTOR, sizeof (EFI_HOB_RESOURCE_DESCRIPTOR));
59 ASSERT (Hob != NULL);
60+ if (Hob == NULL) {
61+ return;
62+ }
63
64 Hob->ResourceType = ResourceType;
65 Hob->ResourceAttribute = ResourceAttribute;
66@@ -401,6 +411,10 @@ BuildModuleHob (
67 );
68
69 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION_MODULE));
70+ ASSERT (Hob != NULL);
71+ if (Hob == NULL) {
72+ return;
73+ }
74
75 CopyGuid (&(Hob->MemoryAllocationHeader.Name), &gEfiHobMemoryAllocModuleGuid);
76 Hob->MemoryAllocationHeader.MemoryBaseAddress = MemoryAllocationModule;
77@@ -449,6 +463,11 @@ BuildGuidHob (
78 ASSERT (DataLength <= (0xffff - sizeof (EFI_HOB_GUID_TYPE)));
79
80 Hob = CreateHob (EFI_HOB_TYPE_GUID_EXTENSION, (UINT16)(sizeof (EFI_HOB_GUID_TYPE) + DataLength));
81+ ASSERT (Hob != NULL);
82+ if (Hob == NULL) {
83+ return NULL;
84+ }
85+
86 CopyGuid (&Hob->Name, Guid);
87 return Hob + 1;
88 }
89@@ -512,6 +531,10 @@ BuildFvHob (
90 EFI_HOB_FIRMWARE_VOLUME *Hob;
91
92 Hob = CreateHob (EFI_HOB_TYPE_FV, sizeof (EFI_HOB_FIRMWARE_VOLUME));
93+ ASSERT (Hob != NULL);
94+ if (Hob == NULL) {
95+ return;
96+ }
97
98 Hob->BaseAddress = BaseAddress;
99 Hob->Length = Length;
100@@ -543,6 +566,10 @@ BuildFv2Hob (
101 EFI_HOB_FIRMWARE_VOLUME2 *Hob;
102
103 Hob = CreateHob (EFI_HOB_TYPE_FV2, sizeof (EFI_HOB_FIRMWARE_VOLUME2));
104+ ASSERT (Hob != NULL);
105+ if (Hob == NULL) {
106+ return;
107+ }
108
109 Hob->BaseAddress = BaseAddress;
110 Hob->Length = Length;
111@@ -584,6 +611,10 @@ BuildFv3Hob (
112 EFI_HOB_FIRMWARE_VOLUME3 *Hob;
113
114 Hob = CreateHob (EFI_HOB_TYPE_FV3, sizeof (EFI_HOB_FIRMWARE_VOLUME3));
115+ ASSERT (Hob != NULL);
116+ if (Hob == NULL) {
117+ return;
118+ }
119
120 Hob->BaseAddress = BaseAddress;
121 Hob->Length = Length;
122@@ -639,6 +670,10 @@ BuildCpuHob (
123 EFI_HOB_CPU *Hob;
124
125 Hob = CreateHob (EFI_HOB_TYPE_CPU, sizeof (EFI_HOB_CPU));
126+ ASSERT (Hob != NULL);
127+ if (Hob == NULL) {
128+ return;
129+ }
130
131 Hob->SizeOfMemorySpace = SizeOfMemorySpace;
132 Hob->SizeOfIoSpace = SizeOfIoSpace;
133@@ -676,6 +711,10 @@ BuildStackHob (
134 );
135
136 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION_STACK));
137+ ASSERT (Hob != NULL);
138+ if (Hob == NULL) {
139+ return;
140+ }
141
142 CopyGuid (&(Hob->AllocDescriptor.Name), &gEfiHobMemoryAllocStackGuid);
143 Hob->AllocDescriptor.MemoryBaseAddress = BaseAddress;
144@@ -756,6 +795,10 @@ BuildMemoryAllocationHob (
145 );
146
147 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION));
148+ ASSERT (Hob != NULL);
149+ if (Hob == NULL) {
150+ return;
151+ }
152
153 ZeroMem (&(Hob->AllocDescriptor.Name), sizeof (EFI_GUID));
154 Hob->AllocDescriptor.MemoryBaseAddress = BaseAddress;
155--
1562.40.0
157
diff --git a/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0003.patch b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0003.patch
new file mode 100644
index 0000000000..9579205e09
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/CVE-2022-36765-0003.patch
@@ -0,0 +1,135 @@
1From 9a75b030cf27d2530444e9a2f9f11867f79bf679 Mon Sep 17 00:00:00 2001
2From: Gua Guo <gua.guo@intel.com>
3Date: Thu, 11 Jan 2024 13:03:26 +0800
4Subject: [PATCH] StandaloneMmPkg/Hob: Integer Overflow in CreateHob()
5
6REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4166
7
8Fix integer overflow in various CreateHob instances.
9Fixes: CVE-2022-36765
10
11The CreateHob() function aligns the requested size to 8
12performing the following operation:
13```
14HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
15```
16
17No checks are performed to ensure this value doesn't
18overflow, and could lead to CreateHob() returning a smaller
19HOB than requested, which could lead to OOB HOB accesses.
20
21Reported-by: Marc Beatove <mbeatove@google.com>
22Reviewed-by: Ard Biesheuvel <ardb+tianocore@kernel.org>
23Cc: Sami Mujawar <sami.mujawar@arm.com>
24Reviewed-by: Ray Ni <ray.ni@intel.com>
25Cc: John Mathew <john.mathews@intel.com>
26Authored-by: Gerd Hoffmann <kraxel@redhat.com>
27Signed-off-by: Gua Guo <gua.guo@intel.com>
28
29CVE: CVE-2022-36765
30
31Upstream-Status: Backport [https://github.com/tianocore/edk2/commit/9a75b030cf27d2530444e9a2f9f11867f79bf679]
32
33Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
34---
35 .../Arm/StandaloneMmCoreHobLib.c | 35 +++++++++++++++++++
36 1 file changed, 35 insertions(+)
37
38diff --git a/StandaloneMmPkg/Library/StandaloneMmCoreHobLib/Arm/StandaloneMmCoreHobLib.c b/StandaloneMmPkg/Library/StandaloneMmCoreHobLib/Arm/StandaloneMmCoreHobLib.c
39index 1550e1babc..59473e28fe 100644
40--- a/StandaloneMmPkg/Library/StandaloneMmCoreHobLib/Arm/StandaloneMmCoreHobLib.c
41+++ b/StandaloneMmPkg/Library/StandaloneMmCoreHobLib/Arm/StandaloneMmCoreHobLib.c
42@@ -34,6 +34,13 @@ CreateHob (
43
44 HandOffHob = GetHobList ();
45
46+ //
47+ // Check Length to avoid data overflow.
48+ //
49+ if (HobLength > MAX_UINT16 - 0x7) {
50+ return NULL;
51+ }
52+
53 HobLength = (UINT16)((HobLength + 0x7) & (~0x7));
54
55 FreeMemory = HandOffHob->EfiFreeMemoryTop - HandOffHob->EfiFreeMemoryBottom;
56@@ -89,6 +96,10 @@ BuildModuleHob (
57 );
58
59 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION_MODULE));
60+ ASSERT (Hob != NULL);
61+ if (Hob == NULL) {
62+ return;
63+ }
64
65 CopyGuid (&(Hob->MemoryAllocationHeader.Name), &gEfiHobMemoryAllocModuleGuid);
66 Hob->MemoryAllocationHeader.MemoryBaseAddress = MemoryAllocationModule;
67@@ -129,6 +140,9 @@ BuildResourceDescriptorHob (
68
69 Hob = CreateHob (EFI_HOB_TYPE_RESOURCE_DESCRIPTOR, sizeof (EFI_HOB_RESOURCE_DESCRIPTOR));
70 ASSERT (Hob != NULL);
71+ if (Hob == NULL) {
72+ return;
73+ }
74
75 Hob->ResourceType = ResourceType;
76 Hob->ResourceAttribute = ResourceAttribute;
77@@ -167,6 +181,11 @@ BuildGuidHob (
78 ASSERT (DataLength <= (0xffff - sizeof (EFI_HOB_GUID_TYPE)));
79
80 Hob = CreateHob (EFI_HOB_TYPE_GUID_EXTENSION, (UINT16)(sizeof (EFI_HOB_GUID_TYPE) + DataLength));
81+ ASSERT (Hob != NULL);
82+ if (Hob == NULL) {
83+ return NULL;
84+ }
85+
86 CopyGuid (&Hob->Name, Guid);
87 return Hob + 1;
88 }
89@@ -226,6 +245,10 @@ BuildFvHob (
90 EFI_HOB_FIRMWARE_VOLUME *Hob;
91
92 Hob = CreateHob (EFI_HOB_TYPE_FV, sizeof (EFI_HOB_FIRMWARE_VOLUME));
93+ ASSERT (Hob != NULL);
94+ if (Hob == NULL) {
95+ return;
96+ }
97
98 Hob->BaseAddress = BaseAddress;
99 Hob->Length = Length;
100@@ -255,6 +278,10 @@ BuildFv2Hob (
101 EFI_HOB_FIRMWARE_VOLUME2 *Hob;
102
103 Hob = CreateHob (EFI_HOB_TYPE_FV2, sizeof (EFI_HOB_FIRMWARE_VOLUME2));
104+ ASSERT (Hob != NULL);
105+ if (Hob == NULL) {
106+ return;
107+ }
108
109 Hob->BaseAddress = BaseAddress;
110 Hob->Length = Length;
111@@ -282,6 +309,10 @@ BuildCpuHob (
112 EFI_HOB_CPU *Hob;
113
114 Hob = CreateHob (EFI_HOB_TYPE_CPU, sizeof (EFI_HOB_CPU));
115+ ASSERT (Hob != NULL);
116+ if (Hob == NULL) {
117+ return;
118+ }
119
120 Hob->SizeOfMemorySpace = SizeOfMemorySpace;
121 Hob->SizeOfIoSpace = SizeOfIoSpace;
122@@ -319,6 +350,10 @@ BuildMemoryAllocationHob (
123 );
124
125 Hob = CreateHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, sizeof (EFI_HOB_MEMORY_ALLOCATION));
126+ ASSERT (Hob != NULL);
127+ if (Hob == NULL) {
128+ return;
129+ }
130
131 ZeroMem (&(Hob->AllocDescriptor.Name), sizeof (EFI_GUID));
132 Hob->AllocDescriptor.MemoryBaseAddress = BaseAddress;
133--
1342.40.0
135
diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb
index dbfed086e4..1dba709824 100644
--- a/meta/recipes-core/ovmf/ovmf_git.bb
+++ b/meta/recipes-core/ovmf/ovmf_git.bb
@@ -50,6 +50,9 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \
50 file://CVE-2023-45237-0001.patch \ 50 file://CVE-2023-45237-0001.patch \
51 file://CVE-2023-45237-0002.patch \ 51 file://CVE-2023-45237-0002.patch \
52 file://CVE-2023-45236.patch \ 52 file://CVE-2023-45236.patch \
53 file://CVE-2022-36765-0001.patch \
54 file://CVE-2022-36765-0002.patch \
55 file://CVE-2022-36765-0003.patch \
53 " 56 "
54 57
55PV = "edk2-stable202202" 58PV = "edk2-stable202202"