{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_3_18-57-default":"2-3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP3","name":"kernel-livepatch-SLE15-SP3_Update_0","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2-3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 5.3.18-57 fixes several issues.\n\nThe following issues were fixed:\n\n- CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve did not check that the allocated size was smaller than the ringbuf size (bsc#1185640).\n- CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) did not update the 32-bit bounds (bsc#1185641).\n- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).\n- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bsc#1184611).\n- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).\n- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).\n- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593).\n- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185847).\n","id":"SUSE-SU-2021:2198-1","modified":"2021-06-29T08:59:01Z","published":"2021-06-29T08:59:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20212198-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1183658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184710"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184952"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185796"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185856"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185899"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36322"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-28660"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-29154"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-33034"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3490"}],"related":["CVE-2020-36322","CVE-2021-28660","CVE-2021-29154","CVE-2021-32399","CVE-2021-33034","CVE-2021-3489","CVE-2021-3490"],"summary":"Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP3)","upstream":["CVE-2020-36322","CVE-2021-28660","CVE-2021-29154","CVE-2021-32399","CVE-2021-33034","CVE-2021-3489","CVE-2021-3490"]}