Buffer overflow in system firmware for EDK II may allow unauthenticated user to potentially enable escalation of privilege and/or denial of service via network access.
References
Link | Resource |
---|---|
https://edk2-docs.gitbooks.io/security-advisory/content/partitiondxe-and-udf-buffer-overflow.html | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00048.html | Mailing List Patch Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:2125 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/ | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3338 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-03-27 13:29
Updated : 2022-04-05 13:36
NVD link : CVE-2019-0160
Mitre link : CVE-2019-0160
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
redhat
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_server
- enterprise_linux_eus
fedoraproject
- fedora
tianocore
- edk_ii
opensuse
- leap