Количество 15
Количество 15
GHSA-7xmv-6q8v-3hhw
An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures.

CVE-2019-12380
**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.

CVE-2019-12380
**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.

CVE-2019-12380
**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
CVE-2019-12380
**DISPUTED** An issue was discovered in the efi subsystem in the Linux ...

openSUSE-SU-2019:1571-1
Security update for the Linux Kernel

SUSE-SU-2019:1852-1
Security update for the Linux Kernel

SUSE-SU-2019:1829-1
Security update for the Linux Kernel

SUSE-SU-2019:1823-2
Security update for the Linux Kernel

SUSE-SU-2019:1823-1
Security update for the Linux Kernel

SUSE-SU-2019:1855-1
Security update for the Linux Kernel
ELSA-2020-5913
ELSA-2020-5913: Unbreakable Enterprise kernel security update (IMPORTANT)

openSUSE-SU-2019:1579-1
Security update for the Linux Kernel

openSUSE-SU-2019:1570-1
Security update for the Linux Kernel

SUSE-SU-2019:2450-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-7xmv-6q8v-3hhw An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. | 0% Низкий | около 3 лет назад | ||
![]() | CVE-2019-12380 **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”. | CVSS3: 5.5 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-12380 **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”. | CVSS3: 6.2 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-12380 **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”. | CVSS3: 5.5 | 0% Низкий | около 6 лет назад |
CVE-2019-12380 **DISPUTED** An issue was discovered in the efi subsystem in the Linux ... | CVSS3: 5.5 | 0% Низкий | около 6 лет назад | |
![]() | openSUSE-SU-2019:1571-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1852-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1829-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1823-2 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1823-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1855-1 Security update for the Linux Kernel | около 6 лет назад | ||
ELSA-2020-5913 ELSA-2020-5913: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 4 лет назад | |||
![]() | openSUSE-SU-2019:1579-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | openSUSE-SU-2019:1570-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:2450-1 Security update for the Linux Kernel | почти 6 лет назад |
Уязвимостей на страницу