vulnerability
Ubuntu: (Multiple Advisories) (CVE-2019-12380): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | May 28, 2019 | Aug 5, 2020 | Nov 27, 2024 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
May 28, 2019
Added
Aug 5, 2020
Modified
Nov 27, 2024
Description
**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
Solutions
ubuntu-upgrade-linux-image-4-15-0-1046-oracleubuntu-upgrade-linux-image-4-15-0-1048-oracleubuntu-upgrade-linux-image-4-15-0-1064-gkeubuntu-upgrade-linux-image-4-15-0-1065-raspi2ubuntu-upgrade-linux-image-4-15-0-1069-kvmubuntu-upgrade-linux-image-4-15-0-107-genericubuntu-upgrade-linux-image-4-15-0-107-generic-lpaeubuntu-upgrade-linux-image-4-15-0-107-lowlatencyubuntu-upgrade-linux-image-4-15-0-1074-awsubuntu-upgrade-linux-image-4-15-0-1077-awsubuntu-upgrade-linux-image-4-15-0-1078-gcpubuntu-upgrade-linux-image-4-15-0-1081-snapdragonubuntu-upgrade-linux-image-4-15-0-109-genericubuntu-upgrade-linux-image-4-15-0-109-generic-lpaeubuntu-upgrade-linux-image-4-15-0-109-lowlatencyubuntu-upgrade-linux-image-4-15-0-1091-azureubuntu-upgrade-linux-image-4-15-0-1091-oemubuntu-upgrade-linux-image-4-4-0-1075-awsubuntu-upgrade-linux-image-4-4-0-1077-kvmubuntu-upgrade-linux-image-4-4-0-1111-awsubuntu-upgrade-linux-image-4-4-0-1136-raspi2ubuntu-upgrade-linux-image-4-4-0-1140-snapdragonubuntu-upgrade-linux-image-4-4-0-186-genericubuntu-upgrade-linux-image-4-4-0-186-generic-lpaeubuntu-upgrade-linux-image-4-4-0-186-lowlatencyubuntu-upgrade-linux-image-4-4-0-186-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-186-powerpc-smpubuntu-upgrade-linux-image-4-4-0-186-powerpc64-embubuntu-upgrade-linux-image-4-4-0-186-powerpc64-smpubuntu-upgrade-linux-image-5-0-0-1045-gkeubuntu-upgrade-linux-image-5-0-0-1065-oem-osp1ubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-hweubuntu-upgrade-linux-image-aws-lts-18-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-lts-18-04ubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-18-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-4-15ubuntu-upgrade-linux-image-gke-5-0ubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-18-04ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04ubuntu-upgrade-linux-image-virtual-lts-xenial
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.