VYPR

rpm package

suse/kgraft-patch-SLE12-SP3_Update_27&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3

pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3

Vulnerabilities (26)

  • CVE-2019-12614Jun 3, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).

  • CVE-2019-12456May 30, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two

  • CVE-2019-12380May 28, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed

  • CVE-2018-20836May 7, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

  • CVE-2019-11599Apr 29, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other

  • CVE-2019-11487Apr 23, 2019
    affected < 1-4.3.1fixed 1-4.3.1

    The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm

Page 2 of 2