VYPR

rpm package

suse/kgraft-patch-SLE12-SP2_Update_31&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP2

pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2

Vulnerabilities (25)

  • CVE-2019-12380May 28, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed

  • CVE-2018-20836May 7, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

  • CVE-2019-11599Apr 29, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other

  • CVE-2019-11487Apr 23, 2019
    affected < 1-3.3.1fixed 1-3.3.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

  • CVE-2018-5390Aug 6, 2018
    affected < 2-2.1fixed 2-2.1

    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.

Page 2 of 2