First published: Tue Dec 31 2019(Updated: )
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK2 | ||
Debian Debian Linux | =9.0 | |
ubuntu/edk2 | <0~20180205. | 0~20180205. |
ubuntu/edk2 | <0~20190606.20 | 0~20190606.20 |
ubuntu/edk2 | <0~20200229.4 | 0~20200229.4 |
ubuntu/edk2 | <0~20160408. | 0~20160408. |
debian/edk2 | 0~20181115.85588389-3+deb10u3 2020.11-2+deb11u1 2020.11-2+deb11u2 2022.11-6 2022.11-6+deb12u1 2024.02-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14586 is a use after free vulnerability in EDK II that may allow an authenticated user to potentially enable escalation of privilege, information disclosure, and/or denial of service via adjacent access.
The EDK II package versions 0~20180205, 0~20190606.20, 0~20200229.4, 0~20160408, and other specified Debian packages are affected.
CVE-2019-14586 has a severity rating of 'high' with a severity value of 8.
An attacker can exploit CVE-2019-14586 by leveraging the use after free vulnerability in EDK II to potentially enable escalation of privilege, information disclosure, and/or denial of service via adjacent access.
To fix CVE-2019-14586, update the affected EDK II package versions to the specified remedial versions mentioned in the software statement.