First published: Tue Jun 05 2018(Updated: )
Last updated 10 October 2024
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ovmf | <0:20180508-6.gitee3198e672e2.el7 | 0:20180508-6.gitee3198e672e2.el7 |
redhat/edk2 | <0:20190308git89910a39dcfd-6.el8 | 0:20190308git89910a39dcfd-6.el8 |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
Tianocore EDK II | ||
debian/edk2 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.11-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-0161 is a vulnerability that allows an unauthenticated user to potentially enable denial of service via local access.
The severity of CVE-2019-0161 is medium with a CVSS score of 5.9.
The software packages affected by CVE-2019-0161 are ovmf, edk2, imgbased, ovirt-node-ng, redhat-release-virtualization-host, redhat-virtualization-host, and Tianocore Edk Ii.
To fix CVE-2019-0161, it is recommended to update the affected software packages to the specified versions provided in the remediation section of the vulnerability.
You can find more information about CVE-2019-0161 at the provided references: [link1], [link2], [link3].