First published: Wed Mar 27 2019(Updated: )
Buffer overflow in network stack for EDK II may allow unprivileged user to potentially enable escalation of privilege and/or denial of service via network.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II | ||
debian/edk2 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.05-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12178 is critical with a CVSS score of 9.1.
An unprivileged user can potentially exploit CVE-2018-12178 to enable escalation of privilege and/or denial of service via the network.
The affected software for CVE-2018-12178 is EDK II on Debian and Ubuntu.
To fix CVE-2018-12178 on Debian, update the edk2 package to version 0~20181115.85588389-3+deb10u3 or later.
To fix CVE-2018-12178 on Ubuntu, update the edk2 package to the appropriate version based on the affected release (e.g., bionic, xenial).