{"id":"CVE-2022-36764","details":"EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.","aliases":["GHSA-4hcq-p8q8-hj8j"],"modified":"2026-05-19T03:53:28.250193Z","published":"2024-01-09T16:15:43.327Z","related":["ALSA-2024:2264","ALSA-2024:3017","openSUSE-SU-2024:13949-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/"},{"type":"ADVISORY","url":"https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tianocore/edk2","events":[{"introduced":"0"},{"last_affected":"8736b8fdca85e02933cdb0a13309de14c9799ece"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"202311"}],"cpe":"cpe:2.3:a:tianocore:edk2:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["edk2-stable202311","edk2-stable202308","edk2-stable202305","edk2-stable202302","edk2-stable202211","edk2-stable202208","edk2-stable202205","edk2-stable202205-rc1","edk2-stable202202","edk2-stable202202-rc1","edk2-stable202111","edk2-stable202111-rc1","edk2-stable202108","edk2-stable202108-rc1","edk2-stable202108-rc0","edk2-stable202105","edk2-stable202102","edk2-stable202011","edk2-stable202008","edk2-stable202005","edk2-stable202002","edk2-stable201911","edk2-stable201908","edk2-stable201905","edk2-stable201903","edk2-stable201811","edk2-stable201808"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36764.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}