A vulnerability was found in edk2. A stack buffer overflow in file/path name string check in UdfDxe/File.c when a long file name (> 128 characters) or a long path name (> 256 characters) is supplied. Upstream Bug: https://bugzilla.tianocore.org/show_bug.cgi?id=828 Upstream Patch: https://github.com/tianocore/edk2/commit/b9ae1705adfdd43668027a25a2b03c2e81960219
Created edk2 tracking bugs for this issue: Affects: epel-all [bug 1683406] Affects: fedora-all [bug 1683405]
Closing this in favor of bug 1691640.