File _patchinfo of Package patchinfo.16256
<patchinfo incident="16256">
<issue id="1172437" tracker="bnc">VUL-0: CVE-2020-10757: kernel live patch: remap hugepage DAX to anon mmap can cause user PTE access</issue>
<issue id="1173659" tracker="bnc">VUL-0: CVE-2019-16746: kernel live patch: buffer overflow via missing check of variable elements length in a beacon head in net/wireless/nl80211.c</issue>
<issue id="1174186" tracker="bnc">VUL-0: CVE-2020-15780: kernel live patch: lockdown bypass for loading unsigned modules using ACPI table injection</issue>
<issue id="1174247" tracker="bnc">VUL-0: CVE-2020-14331: kernel live patch: buffer over write in vgacon_scroll</issue>
<issue id="2019-16746" tracker="cve" />
<issue id="2020-10757" tracker="cve" />
<issue id="2020-14331" tracker="cve" />
<issue id="2020-15780" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.12.14-95_51 fixes several issues.
The following security issues were fixed:
- CVE-2020-10757: Fixed a privilege escalation in the mremap handling of DAX Huge Pages (bsc#1172437).
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
</description>
<summary>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)</summary>
</patchinfo>