First published: Fri Mar 29 2019(Updated: )
Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access. Reference: <a href="https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html">https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html</a> Upstream commits: <a href="https://github.com/tianocore/edk2/commit/acebdf14c985c5c9f50b37ece0b15ada87767359">https://github.com/tianocore/edk2/commit/acebdf14c985c5c9f50b37ece0b15ada87767359</a> <a href="https://github.com/tianocore/edk2/commit/72750e3bf9174f15c17e78f0f117b5e7311bb49f">https://github.com/tianocore/edk2/commit/72750e3bf9174f15c17e78f0f117b5e7311bb49f</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TianoCore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1694065 is considered high due to the potential for denial of service by an unauthenticated user.
To fix REDHAT-BUG-1694065, update to the patched version of TianoCore EDK II that addresses the stack overflow vulnerability.
Users running TianoCore EDK II are affected by REDHAT-BUG-1694065.
REDHAT-BUG-1694065 is associated with a local denial of service attack due to stack overflow.
No, authentication is not required to exploit REDHAT-BUG-1694065, making it particularly dangerous.