CVE-2019-14553

NameCVE-2019-14553
DescriptionImproper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs941775

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
edk2 (PTS)jessie/non-free0~20131112.2590861a-3vulnerable
stretch (security), stretch (lts), stretch0~20161202.7bbe0b3e-1+deb9u2vulnerable
buster (security), buster, buster (lts)0~20181115.85588389-3+deb10u4vulnerable
bullseye (security), bullseye2020.11-2+deb11u2fixed
bookworm (security), bookworm2022.11-6+deb12u1fixed
sid, trixie2024.11-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
edk2source(unstable)0~20190828.37eef910-4unimportant941775

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1758518
https://bugzilla.tianocore.org/show_bug.cgi?id=960
unimportant, as Debian builds do not enable HTTPSBOOT (via
-DNETWORK_TLS_ENABLE=TRUE).

Search for package or bug name: Reporting problems