File _patchinfo of Package patchinfo.18542
<patchinfo incident="18542">
<issue id="1165631" tracker="bnc">VUL-0: CVE-2020-1749: kernel live patch: some ipv6 protocols not encrypted over ipsec tunnel.</issue>
<issue id="1176931" tracker="bnc">VUL-1: CVE-2020-0429: kernel live patch: possible memory corruption in l2tp_session_delete and related functions of l2tp_core.c</issue>
<issue id="1177513" tracker="bnc">VUL-0: CVE-2020-25645: kernel live patch: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints</issue>
<issue id="1178684" tracker="bnc">VUL-0: CVE-2020-28374: kernel live patch: LIO security issue</issue>
<issue id="1179616" tracker="bnc">VUL-0: CVE-2020-27786: kernel live patch: use-after-free in kernel midi subsystem snd_rawmidi_kernel_read1()</issue>
<issue id="2020-0429" tracker="cve" />
<issue id="2020-1749" tracker="cve" />
<issue id="2020-25645" tracker="cve" />
<issue id="2020-27786" tracker="cve" />
<issue id="2020-28374" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.4.121-92_149 fixes several issues.
The following security issues were fixed:
- CVE-2020-27786: Fixed a potential user after free which could have led to memory corruption or privilege escalation (bsc#1179616).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2020-25645: Fixed an issue where the traffic between two Geneve endpoints may have been unencrypted when IPsec was configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177513).
- CVE-2020-0429: Fixed a potential memory corruption due to a use after free which could have led local escalation of privilege with System execution privileges needed (bsc#1176931).
- CVE-2020-1749: Fixed an issue in some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6 where the kernel was not correctly routing tunneled data over the encrypted link rather sending the data unencrypted (bsc#1165631).
</description>
<summary>Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP2)</summary>
</patchinfo>