File _patchinfo of Package patchinfo.13479

<patchinfo incident="13479">
  <issue id="1153108" tracker="bnc"></issue>
  <issue id="1156317" tracker="bnc"></issue>
  <issue id="1156321" tracker="bnc"></issue>
  <issue id="1157770" tracker="bnc"></issue>
  <issue id="2019-10220" tracker="cve" />
  <issue id="2019-13272" tracker="cve" />
  <issue id="2019-15239" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>nstange</packager>
  <description>This update for the Linux Kernel 4.12.14-197_4 fixes several issues.

The following security issues were fixed:

- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2019-15239: Fixed a vulnerability where a local attacker could have triggered multiple use-after-free conditions resulted in privilege escalation (bsc#1156317).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).

The following bugs were fixed:

- Fixed boot up hang revealed by int3 self test (bsc#1157770).
</description>
<summary>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP1)</summary>
</patchinfo>
openSUSE Build Service is sponsored by