First published: Mon Nov 23 2020(Updated: )
Last updated 24 July 2024
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK2 | ||
Debian Debian Linux | =9.0 | |
debian/edk2 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.05-2 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-14587 is medium with a CVSS score of 6.5.
An unauthenticated user can exploit CVE-2019-14587 to potentially enable denial of service through adjacent access.
The affected software versions include 0~20180205, 0~20190606.20, 0~20200229.4, 0~20160408, 0~20181115.85588389-3+deb10u3, 2020.11-2+deb11u1, 2022.11-6, 2023.05-2, Tianocore EDK2, and Debian Linux 9.0.
To mitigate CVE-2019-14587 on Ubuntu, ensure you have the recommended version of the 'edk2' package installed.
You can find more information about CVE-2019-14587 on the following references: [Bugzilla](https://bugzilla.tianocore.org/show_bug.cgi?id=1989), [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html), [Launchpad](https://launchpad.net/bugs/cve/CVE-2019-14587).