File _patchinfo of Package patchinfo.16256

<patchinfo incident="16256">
  <issue id="1172437" tracker="bnc">VUL-0: CVE-2020-10757: kernel live patch: remap hugepage DAX to anon mmap can cause user PTE access</issue>
  <issue id="1173659" tracker="bnc">VUL-0: CVE-2019-16746: kernel live patch: buffer overflow via missing check of  variable elements length in a beacon head in net/wireless/nl80211.c</issue>
  <issue id="1174186" tracker="bnc">VUL-0: CVE-2020-15780: kernel live patch: lockdown bypass for loading unsigned modules using ACPI table injection</issue>
  <issue id="1174247" tracker="bnc">VUL-0: CVE-2020-14331: kernel live patch: buffer over write in vgacon_scroll</issue>
  <issue id="2019-16746" tracker="cve" />
  <issue id="2020-10757" tracker="cve" />
  <issue id="2020-14331" tracker="cve" />
  <issue id="2020-15780" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-95_51 fixes several issues.

The following security issues were fixed:

- CVE-2020-10757: Fixed a privilege escalation in the mremap handling of DAX Huge Pages (bsc#1172437).
- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
</description>
<summary>Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4)</summary>
</patchinfo>
openSUSE Build Service is sponsored by