[LU-13812] kernel update [RHEL8.2 4.18.0-193.13.2.el8_2] Created: 21/Jul/20  Updated: 29/Jul/20  Resolved: 29/Jul/20

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-13657 kernel update [RHEL8.2 4.18.0-193.6.3... Resolved
is related to LU-13829 kernel update [RHEL8.2 4.18.0-193.14.... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

An update for kernel is now available for Red Hat Enterprise Linux 8.2.

Security Fix(es):

  • kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)
  • kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
  • kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
  • kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
  • kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
  • kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
  • kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
  • Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
  • kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)

Bug Fix(es):

  • [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821378)
  • [FJ8.0 Bug]: System hungs up after setting parameters for hugepages (BZ#1835789)
  • RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836229)
  • "[sig-network] Services should be rejected when no endpoints exist" test fails frequently on RHEL8 nodes (BZ#1836302)
  • RHEL8.2 Beta - RHEL8.2 reports EEH errors on internal SAS adapter during HTX run on PMEM (SCM/pmem) (BZ#1842406)
  • RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1842620)
  • deadlock between modprobe and netns exit (BZ#1845164)
  • exit_boot failed when install RHEL8.1 (BZ#1846180)
  • http request is taking more time for endpoint running on different host via nodeport service (BZ#1847128)
  • RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847453)
  • WARNING: CPU: 1 PID: 0 at arch/x86/kernel/apic/vector.c:846 free_moved_vector+0x141/0x150 (BZ#1848545)
  • Backport conntrack race condition fixes (BZ#1851003)
  • nf_conntrack module unload fail and refcount become to negative (BZ#1851005)
  • OVS: backport performance patches from upstream to 8.2z (BZ#1851235)
  • RHEL8.3: backport "smp: Allow smp_call_function_single_async() to insert locked csd" (BZ#1851406)
  • [DELL EMC 8.2 BUG] NVMe drive is not detected after multiple hotplug (hot add + surprise remove) operations (BZ#1852045)

Enhancement(s):

  • [Mellanox 8.3 FEAT] mlx5: drivers update upto Linux v5.5 (BZ#1843544)
  • [IBM 8.3 FEAT] Update nvme driver to latest level for POWER (BZ#1846405)

https://access.redhat.com/errata/RHSA-2020:3010?sc_cid=701600000006NHXAA2



 Comments   
Comment by Gerrit Updater [ 23/Jul/20 ]

Jian Yu (yujian@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/39495
Subject: LU-13812 kernel: kernel update RHEL8.2 [4.18.0-193.13.2.el8_2]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: b65e5fd51e657bb90be9a9accfb34e1aadc2f310

Comment by Gerrit Updater [ 23/Jul/20 ]

Jian Yu (yujian@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/39497
Subject: LU-13812 kernel: kernel update RHEL8.2 [4.18.0-193.13.2.el8_2]
Project: fs/lustre-release
Branch: b2_12
Current Patch Set: 1
Commit: 4be5fa491b79330c969d2342fc8a999292087131

Comment by Jian Yu [ 29/Jul/20 ]

A new kernel version is released: LU-13829

Generated at Sat Feb 10 03:04:25 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.