**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when an application does not properly handle errors that occur during processing. According to the authors of the Seven Pernicious Kingdoms, "Errors and error handling represent a class of API. Errors related to error handling are so common that they deserve a special kingdom of their own. As with 'API Abuse,' there are two ways to introduce an error-related security vulnerability: the most common one is handling errors poorly (or not at all). The second is producing errors that either give out too much information (to possible attackers) or are difficult to handle."
Link | Tags |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e | mailing list patch vendor advisory |
http://www.securityfocus.com/bid/108477 | vdb entry third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html | vendor advisory |
https://security.netapp.com/advisory/ntap-20190710-0002/ | |
https://usn.ubuntu.com/4427-1/ | vendor advisory |
https://usn.ubuntu.com/4414-1/ | vendor advisory |
https://usn.ubuntu.com/4439-1/ | vendor advisory |