File _patchinfo of Package patchinfo.25284
<patchinfo incident="25284">
<issue id="1173514" tracker="bnc">VUL-1: CVE-2020-15393: kernel-source: memory leak in usbtest_disconnect in drivers/usb/misc/usbtest.c, aka CID-28ebeb8db770</issue>
<issue id="1196973" tracker="bnc">VUL-0: CVE-2021-39713: kernel-source-rt,kernel-source-azure,kernel-source: race condition in the network scheduling subsystem which could lead to a use-after-free</issue>
<issue id="1198829" tracker="bnc">VUL-0: CVE-2022-1462: kernel-source,kernel-source-rt,kernel-source-azure: A race condition vulnerability in drivers/tty/tty_buffers.c</issue>
<issue id="1200598" tracker="bnc">VUL-0: CVE-2022-20166: kernel-source-rt,kernel-source,kernel-source-azure: possible out of bounds write due to sprintf unsafety</issue>
<issue id="1200762" tracker="bnc">VUL-0: CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742: xen: Linux disk/nic frontends data leaks (XSA-403)</issue>
<issue id="1200910" tracker="bnc">VUL-0: CVE-2020-36558: kernel: use after free due to race condition between ioctl(VT_DISALLOCATE) and ioctl(VT_RESIZEX)</issue>
<issue id="1201251" tracker="bnc">VUL-0: CVE-2022-2318: kernel-source,kernel-source-rt,kernel-source-azure: Use-after-free caused by timer handler in net/rose/rose_timer.c</issue>
<issue id="1201429" tracker="bnc">VUL-0: CVE-2020-36557: kernel use after free due to race condition in ioctl(VT_DISALLOCATE)</issue>
<issue id="1201635" tracker="bnc">VUL-0: CVE-2021-33655: kernel-source,kernel-source-azure,kernel-source-rt: Out of bounds write with ioctl cmd FBIOPUT_VSCREENINFO</issue>
<issue id="1201636" tracker="bnc">VUL-0: CVE-2021-33656: kernel-source-azure,kernel-source,kernel-source-rt: When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds</issue>
<issue id="1201742" tracker="bnc">VUL-0: CVE-2020-36557: kernel live patch: use after free due to race condition in ioctl(VT_DISALLOCATE)</issue>
<issue id="1201752" tracker="bnc">VUL-0: CVE-2020-36558: kernel live patch: use after free due to race condition between ioctl(VT_DISALLOCATE) and ioctl(VT_RESIZEX)</issue>
<issue id="1201930" tracker="bnc">Regression running some VM guests with 5.3.18-150300.59.87.1</issue>
<issue id="1201940" tracker="bnc">VUL-0: CVE-2022-36946: kernel-source-azure,kernel-source,kernel-source-rt: incorrect packet truncation in nfqnl_mangle() leads to remote DoS</issue>
<issue id="2022-36946" tracker="cve" />
<issue id="2022-20166" tracker="cve" />
<issue id="2020-15393" tracker="cve" />
<issue id="2020-36558" tracker="cve" />
<issue id="2020-36557" tracker="cve" />
<issue id="2021-33656" tracker="cve" />
<issue id="2021-33655" tracker="cve" />
<issue id="2022-1462" tracker="cve" />
<issue id="2022-33741" tracker="cve" />
<issue id="2022-2318" tracker="cve" />
<issue id="2022-33740" tracker="cve" />
<issue id="2022-33742" tracker="cve" />
<issue id="2022-26365" tracker="cve" />
<issue id="2021-39713" tracker="cve" />
<category>security</category>
<rating>important</rating>
<packager>osalvador</packager>
<reboot_needed/>
<description>
The SUSE Linux Enterprise 12 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-36946: Fixed an incorrect packet trucation operation which could lead to denial of service (bnc#1201940).
- CVE-2022-20166: Fixed several possible memory safety issues due to unsafe operations (bsc#1200598).
- CVE-2020-15393: Fixed a memory leak in the usbtest driver which could lead to denial of service (bnc#1173514).
- CVE-2020-36558: Fixed a race condition involving VT_RESIZEX which could lead to a NULL pointer dereference and general protection fault (bnc#1200910).
- CVE-2020-36557: Fixed a race condition between the VT_DISALLOCATE ioctl and closing/opening of TTYs could lead to a use-after-free (bnc#1201429).
- CVE-2021-33656: Fixed memory out of bounds write related to ioctl cmd PIO_FONT (bnc#1201636).
- CVE-2021-33655: Fixed out of bounds write with ioctl FBIOPUT_VSCREENINFO (bnc#1201635).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TTY subsystem (bnc#1198829).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-2318: Fixed a use-after-free vulnerability in the timer handler in Rose subsystem that allowed unprivileged attackers to crash the system (bsc#1201251).
- CVE-2021-39713: Fixed a race condition in the network scheduling subsystem which could lead to a use-after-free (bnc#1196973).
The following non-security bugs were fixed:
- kvm: emulate: Do not adjust size of fastop and setcc subroutines (bsc#1201930).
- kvm: emulate: Fix SETcc emulation function offsets with SLS (bsc#1201930).
</description>
<summary>Security update for the Linux Kernel</summary>
</patchinfo>