OESA-2022-1987

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1987
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1987.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2022-1987
Upstream
Published
2022-10-14T11:04:24Z
Modified
2025-08-12T05:04:06.228190Z
Summary
edk2 security update
Details

EDK II is a modern, feature-rich, cross-platform firmware development environment for the UEFI and PI specifications.

Security Fix(es):

Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2019-14584)

Insufficient input validation in MdeModulePkg in EDKII may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical access.(CVE-2019-11098)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP3 / edk2

Package

Name
edk2
Purl
pkg:rpm/openEuler/edk2&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
202002-10.oe1

Ecosystem specific

{
    "src": [
        "edk2-202002-10.oe1.src.rpm"
    ],
    "x86_64": [
        "edk2-devel-202002-10.oe1.x86_64.rpm",
        "edk2-debuginfo-202002-10.oe1.x86_64.rpm",
        "edk2-debugsource-202002-10.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "edk2-devel-202002-10.oe1.aarch64.rpm",
        "edk2-debuginfo-202002-10.oe1.aarch64.rpm",
        "edk2-debugsource-202002-10.oe1.aarch64.rpm"
    ],
    "noarch": [
        "edk2-ovmf-202002-10.oe1.noarch.rpm",
        "python3-edk2-devel-202002-10.oe1.noarch.rpm",
        "edk2-aarch64-202002-10.oe1.noarch.rpm",
        "edk2-help-202002-10.oe1.noarch.rpm"
    ]
}