{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_3_18-24_64-default":"2-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP2","name":"kernel-livepatch-SLE15-SP2_Update_13","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_13&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 5.3.18-24_64 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).\n","id":"SUSE-SU-2021:2027-1","modified":"2021-06-18T09:40:50Z","published":"2021-06-18T09:40:50Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20212027-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-23134"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33200"}],"related":["CVE-2021-23134","CVE-2021-33034","CVE-2021-33200"],"summary":"Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2)","upstream":["CVE-2021-23134","CVE-2021-33034","CVE-2021-33200"]}