[LU-14374] kernel update [SLES15 SP1 4.12.14-197.78.1] Created: 28/Jan/21  Updated: 17/Mar/21  Resolved: 17/Mar/21

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-14218 kernel update [SLES15 SP1 4.12.14-197... Resolved
is related to LU-14528 kernel update [SLES15 SP1 4.12.14-197... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
  • CVE-2020-36158: Fixed a potential remote code execution in the Marvell
    mwifiex driver (bsc#1180559).
  • CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls
    (bsc#1179960).
  • CVE-2020-0466: Fixed a use-after-free due to a logic error in
    do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
  • CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds
    check in the nl80211_policy policy of nl80211.c (bnc#1180086).
  • CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c
    that could have led to local privilege escalation (bnc#1180029).
  • CVE-2020-0444: Fixed a bad kfree due to a logic error in
    audit_data_to_entry (bnc#1180027).
  • CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that
    may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
  • CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed
    a use-after-free attack against TIOCSPGRP (bsc#1179745).
  • CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction
    Services (RTAS) interface, affecting guests running on top of PowerVM or
    KVM hypervisors (bnc#1179107).
  • CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA
    fault statistics were inappropriately freed, aka CID-16d51a590a8c
    (bsc#1179663).
  • CVE-2020-27786: Fixed a use after free in kernel midi subsystem
    snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html



 Comments   
Comment by Gerrit Updater [ 28/Jan/21 ]

Jian Yu (yujian@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/41340
Subject: LU-14374 kernel: kernel update SLES15 SP1 [4.12.14-197.78.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 55a5f5680fbc5a38461642e1c464d8b28113a209

Comment by Jian Yu [ 17/Mar/21 ]

A new version is available in LU-14528

Generated at Sat Feb 10 03:09:11 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.