File _patchinfo of Package patchinfo.13333
<patchinfo incident="13333">
<issue id="1153108" tracker="bnc">VUL-0: CVE-2019-10220: kernel live patch: Samba servers can inject relative paths in directory entry lists</issue>
<issue id="1156320" tracker="bnc">VUL-0: CVE-2018-16871: kernel live patch: nfs: NULL pointer dereference due to an anomalized NFS message sequence</issue>
<issue id="1156321" tracker="bnc">VUL-0: CVE-2019-13272: kernel live patch: Fix ->ptracer_cred handling for PTRACE_TRACEME</issue>
<issue id="1156334" tracker="bnc">VUL-1: CVE-2019-15917: kernel live patch: use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c</issue>
<issue id="2018-16871" tracker="cve" />
<issue id="2019-10220" tracker="cve" />
<issue id="2019-13272" tracker="cve" />
<issue id="2019-15917" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>nstange</packager>
<description>This update for the Linux Kernel 4.12.14-25_28 fixes several issues.
The following security issues were fixed:
- CVE-2019-15917: Fixed a use-after-free when hci_uart_register_dev() fails in hci_uart_set_proto() (bsc#1156334).
- CVE-2019-13272: Fixed a privilege escalation from user to root due to improper handling of credentials by leveraging
certain scenarios with a parent-child process relationship (bsc#1156321).
- CVE-2018-16871: Fixed an issue where an attacker, who could mount an exported NFS filesystem, was able to trigger a
null pointer dereference by using an invalid NFS sequence leading to kernel panic and deny of access to the NFS server
(bsc#1156320).
- CVE-2019-10220: Fixed an issue where samba servers could inject relative paths in directory entry lists (bsc#1153108).
</description>
<summary>Security update for the Linux Kernel (Live Patch 8 for SLE 15)</summary>
</patchinfo>