{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.180-94.174.1","kernel-default-base":"4.4.180-94.174.1","kernel-default-devel":"4.4.180-94.174.1","kernel-devel":"4.4.180-94.174.1","kernel-macros":"4.4.180-94.174.1","kernel-source":"4.4.180-94.174.1","kernel-syms":"4.4.180-94.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3-BCL","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.180-94.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.180-94.174.1","kernel-default-base":"4.4.180-94.174.1","kernel-default-devel":"4.4.180-94.174.1","kernel-devel":"4.4.180-94.174.1","kernel-macros":"4.4.180-94.174.1","kernel-source":"4.4.180-94.174.1","kernel-syms":"4.4.180-94.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3-BCL","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.180-94.174.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"4.4.180-94.174.1","kernel-default-base":"4.4.180-94.174.1","kernel-default-devel":"4.4.180-94.174.1","kernel-devel":"4.4.180-94.174.1","kernel-macros":"4.4.180-94.174.1","kernel-source":"4.4.180-94.174.1","kernel-syms":"4.4.180-94.174.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3-BCL","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.180-94.174.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-2991: Fixed an heap-based overflow in the lightnvm implemenation (bsc#1201420).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim's TCP session (bnc#1196616).\n- CVE-2019-3900: Fixed infinite loop the vhost_net kernel module that could result in a DoS scenario (bnc#1133374).\n\nThe following non-security bugs were fixed:\n\n- net_sched: cls_route: Disallowed handle of 0 (bsc#1202393).\n- mm, rmap: Fixed anon_vma->degree ambiguity leading to double-reuse (bsc#1203098).\n- lightnvm: Removed lightnvm implemenation (bsc#1191881).\n","id":"SUSE-SU-2022:3263-1","modified":"2022-09-14T04:14:47Z","published":"2022-09-14T04:14:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20223263-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1133374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1191881"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1201948"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202096"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202393"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202897"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202898"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203098"},{"type":"REPORT","url":"https://bugzilla.suse.com/1203107"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-3900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-20368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-20369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-21385"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2588"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-26373"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-3028"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-36879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-39188"}],"related":["CVE-2019-3900","CVE-2020-36516","CVE-2022-20368","CVE-2022-20369","CVE-2022-21385","CVE-2022-2588","CVE-2022-26373","CVE-2022-2991","CVE-2022-3028","CVE-2022-36879","CVE-2022-39188"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2019-3900","CVE-2020-36516","CVE-2022-20368","CVE-2022-20369","CVE-2022-21385","CVE-2022-2588","CVE-2022-26373","CVE-2022-2991","CVE-2022-3028","CVE-2022-36879","CVE-2022-39188"]}