First published: Tue Dec 31 2019(Updated: )
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK2 | ||
Debian Debian Linux | =9.0 | |
ubuntu/edk2 | <0~20180205. | 0~20180205. |
ubuntu/edk2 | <0~20190606.20 | 0~20190606.20 |
ubuntu/edk2 | <0~20160408. | 0~20160408. |
debian/edk2 | 0~20181115.85588389-3+deb10u3 2020.11-2+deb11u1 2020.11-2+deb11u2 2022.11-6 2022.11-6+deb12u1 2024.02-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14563 is an integer truncation vulnerability in EDK II that may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-14563 has a severity rating of 7.8 (high).
The affected software includes EDK II versions 0~20181115.85588389-3+deb10u3, 2020.11-2+deb11u1, 2022.11-6, and 2023.05-2 on Debian, and version 0~20180205. on Ubuntu.
To fix CVE-2019-14563 on Debian, update the edk2 package to one of the following versions: 0~20181115.85588389-3+deb10u3, 2020.11-2+deb11u1, 2022.11-6, or 2023.05-2.
To fix CVE-2019-14563 on Ubuntu, update the edk2 package to version 0~20180205.