{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.181.1","kernel-default-base":"4.4.121-92.181.1","kernel-default-devel":"4.4.121-92.181.1","kernel-devel":"4.4.121-92.181.1","kernel-macros":"4.4.121-92.181.1","kernel-source":"4.4.121-92.181.1","kernel-syms":"4.4.121-92.181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.181.1","kernel-default-base":"4.4.121-92.181.1","kernel-default-devel":"4.4.121-92.181.1","kernel-devel":"4.4.121-92.181.1","kernel-macros":"4.4.121-92.181.1","kernel-source":"4.4.121-92.181.1","kernel-syms":"4.4.121-92.181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.181.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.121-92.181.1","kernel-default-base":"4.4.121-92.181.1","kernel-default-devel":"4.4.121-92.181.1","kernel-devel":"4.4.121-92.181.1","kernel-macros":"4.4.121-92.181.1","kernel-source":"4.4.121-92.181.1","kernel-syms":"4.4.121-92.181.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.121-92.181.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-36946: Fixed an incorrect packet trucation operation which could lead to denial of service (bnc#1201940).\n- CVE-2022-20166: Fixed several possible memory safety issues due to unsafe operations (bsc#1200598).\n- CVE-2020-15393: Fixed a memory leak in the usbtest driver which could lead to denial of service (bnc#1173514).\n- CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910).\n- CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of TTYs could lead to a use-after-free (bnc#1201429).\n- CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636).\n- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).\n- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TTY subsystem (bnc#1198829). \n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-2318: Fixed a use-after-free vulnerability in the timer handler in Rose subsystem that allowed unprivileged attackers to crash the system (bsc#1201251).\n- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bnc#1196973).\n\nThe following non-security bugs were fixed:\n\n- kvm: emulate: Do not adjust size of fastop and setcc subroutines (bsc#1201930).\n- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).\n","id":"SUSE-SU-2022:2721-1","modified":"2022-08-09T11:14:00Z","published":"2022-08-09T11:14:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20222721-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173514"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196973"},{"type":"REPORT","url":"https://bugzilla.suse.com/1198829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200598"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1200910"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201429"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201635"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201752"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201940"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-15393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36557"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33655"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33656"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-39713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-1462"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-20166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2318"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-26365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-33742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-36946"}],"related":["CVE-2020-15393","CVE-2020-36557","CVE-2020-36558","CVE-2021-33655","CVE-2021-33656","CVE-2021-39713","CVE-2022-1462","CVE-2022-20166","CVE-2022-2318","CVE-2022-26365","CVE-2022-33740","CVE-2022-33741","CVE-2022-33742","CVE-2022-36946"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2020-15393","CVE-2020-36557","CVE-2020-36558","CVE-2021-33655","CVE-2021-33656","CVE-2021-39713","CVE-2022-1462","CVE-2022-20166","CVE-2022-2318","CVE-2022-26365","CVE-2022-33740","CVE-2022-33741","CVE-2022-33742","CVE-2022-36946"]}