{"id":"CVE-2022-36764","details":"EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.","modified":"2026-04-10T04:49:43.547694Z","published":"2024-01-09T16:15:43.327Z","related":["ALSA-2024:2264","ALSA-2024:3017","GHSA-4hcq-p8q8-hj8j","openSUSE-SU-2024:13949-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tianocore/edk2","events":[{"introduced":"0"},{"last_affected":"8736b8fdca85e02933cdb0a13309de14c9799ece"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"202311"}]}}],"versions":["edk2-stable201808","edk2-stable201811","edk2-stable201903","edk2-stable201905","edk2-stable201908","edk2-stable201911","edk2-stable202002","edk2-stable202005","edk2-stable202008","edk2-stable202011","edk2-stable202102","edk2-stable202105","edk2-stable202108","edk2-stable202108-rc0","edk2-stable202108-rc1","edk2-stable202111","edk2-stable202111-rc1","edk2-stable202202","edk2-stable202202-rc1","edk2-stable202205","edk2-stable202205-rc1","edk2-stable202208","edk2-stable202211","edk2-stable202302","edk2-stable202305","edk2-stable202308","edk2-stable202311"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36764.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}