Bug 1694077 (CVE-2018-12183)
Summary: | CVE-2018-12183 edk2: stack overflow in DxeCore leads to privilege escalation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | berrange, bmcclain, crobinso, dblechte, dfediuck, eedri, kraxel, lersek, mgoldboi, michal.skrivanek, pbonzini, philmd, sbonazzo, sherold, virt-maint, virt-maint, yturgema |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-10 10:52:38 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1694085, 1694086 | ||
Bug Blocks: | 1694083 |
Description
Dhananjay Arunesh
2019-03-29 13:01:51 UTC
External References: https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv-recursion.html Created edk2 tracking bugs for this issue: Affects: fedora-all [bug 1694085] Created edk2 tracking bugs for this issue: Affects: epel-all [bug 1694086] (In reply to Dhananjay Arunesh from comment #1) > External References: > > https://edk2-docs.gitbooks.io/security-advisory/content/unlimited-fv- > recursion.html This advisory references upstream bugs #1126 and #1137. - TianoCore#1126 is open to the public, and it identifies the commit hash (0a0d5296e4) at which the related series was completed. I don't see how that work is related to DxeCore stack overflow. The advisory names the same commit as well. IMO both of these may have been in error, in the advisory (i.e. both the commit hash and the BZ reference); although I could be proved wrong, obviously. - In comparison, TianoCore#1137 has not been opened up to the public. I guess that BZ tracks the actual security bug. Can you please work with the TianoCore Bugzilla InfoSec group to open up TianoCore#1137? Thanks. |