[LU-14451] kernel update [SLES15 SP2 5.3.18-24.49.2] Created: 19/Feb/21  Updated: 17/Mar/21  Resolved: 17/Mar/21

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Won't Fix Votes: 0
Labels: None

Issue Links:
Related
is related to LU-14375 kernel update [SLES15 SP2 5.3.18-24.4... Resolved
is related to LU-14529 kernel update [SLES15 SP2 5.3.18-24.5... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2021-3347: A use-after-free was discovered in the PI futexes during
    fault handling, allowing local users to execute code in the kernel
    (bnc#1181349).
  • CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be
    triggered by local attackers (with access to the nbd device) via an I/O
    request at a certain point during device setup (bnc#1181504).
  • CVE-2021-20177: Fixed a kernel panic related to iptables string matching
    rules. A privileged user could insert a rule which could lead to denial
    of service (bnc#1180765).
  • CVE-2021-0342: In tun_get_user of tun.c, there is possible memory
    corruption due to a use after free. This could lead to local escalation
    of privilege with System execution privileges required. (bnc#1180812)
  • CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was
    found, specifically in the way user calls Ioctl after open dev file and
    fork. A local user could use this flaw to crash the system (bnc#1179878).
  • CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl
    (bnc#1176846).
  • CVE-2020-29569: Fixed a potential privilege escalation and information
    leaks related to the PV block backend, as used by Xen (bnc#1179509).
  • CVE-2020-29568: Fixed a denial of service issue, related to processing
    watch events (bnc#1179508).
  • CVE-2020-25211: Fixed a flaw where a local attacker was able to inject
    conntrack netlink configuration that could cause a denial of service or
    trigger the use of incorrect protocol numbers in
    ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:
https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html



 Comments   
Comment by Gerrit Updater [ 20/Feb/21 ]

Jian Yu (yujian@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/41705
Subject: LU-14451 kernel: kernel update SLES15 SP2 [5.3.18-24.49.2]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 1d4670e742a59f55a0c926c2308e2361ba3bced7

Comment by Jian Yu [ 17/Mar/21 ]

A new version is in LU-14529

Generated at Sat Feb 10 03:09:52 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.