[LU-14671] kernel update [SLES15 SP2 5.3.18-24.61.1] Created: 05/May/21  Updated: 29/May/21  Resolved: 27/May/21

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.15.0

Type: Improvement Priority: Minor
Reporter: Jian Yu Assignee: Jian Yu
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Related
is related to LU-14529 kernel update [SLES15 SP2 5.3.18-24.5... Resolved
is related to LU-14722 kernel update [SLES15 SP2 5.3.18-24.6... Resolved
Rank (Obsolete): 9223372036854775807

 Description   

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various
security and bugfixes.

The following security bugs were fixed:

  • CVE-2021-3444: Fixed an issue with the bpf verifier which did not
    properly handle mod32 destination register truncation when the source
    register was known to be 0 leading to out of bounds read (bsc#1184170).
  • CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent
    (bsc#1173485).
  • CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed
    attackers to obtain sensitive information from kernel memory because of
    a partially uninitialized data structure (bsc#1184192 ).
  • CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have
    allowed attackers to cause a denial of service due to race conditions
    during an update of the local and shared status (bsc#1184167).
  • CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver
    which could have allowed attackers to cause a system crash due to a
    calculation of negative fragment size (bsc#1184168).
  • CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a
    new device name to the driver from userspace, allowing userspace to
    write data to the kernel stack frame directly (bsc#1184198).
  • CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could
    have caused a system crash because the PEBS status in a PEBS record was
    mishandled (bsc#1184196 ).
  • CVE-2021-28964: Fixed a race condition in get_old_root which could have
    allowed attackers to cause a denial of service (bsc#1184193).
  • CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
  • CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan
    (bsc#1183593 ).
  • CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not
    prevent user applications from sending kernel RPC messages (bsc#1183596).
  • CVE-2021-28038: Fixed an issue with the netback driver which was lacking
    necessary treatment of errors such as failed memory allocations
    (bsc#1183022).
  • CVE-2021-27365: Fixed an issue where an unprivileged user can send a
    Netlink message that is associated with iSCSI, and has a length up to
    the maximum length of a Netlink message (bsc#1182715).
  • CVE-2021-27364: Fixed an issue where an attacker could craft Netlink
    messages (bsc#1182717).
  • CVE-2021-27363: Fixed a kernel pointer leak which could have been used
    to determine the address of the iscsi_transport structure (bsc#1182716).
  • CVE-2020-35519: Fixed an out-of-bounds memory access was found in
    x25_bind (bsc#1183696).
  • CVE-2020-27815: Fixed an issue in JFS filesystem where could have
    allowed an attacker to execute code (bsc#1179454).
  • CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds
    speculation on pointer arithmetic, leading to side-channel attacks that
    defeat Spectre mitigations and obtain sensitive information from kernel
    memory (bsc#1183775).
  • CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre
    mitigations and obtain sensitive information from kernel memory
    (bsc#1183686).
  • CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire
    function (bsc#1159280 ).
  • CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in
    aa_audit_rule_init() (bsc#1156256).
  • CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
  • CVE-2021-30002: Fixed a memory leak for large arguments in
    video_usercopy (bsc#1184120).
  • CVE-2021-29154: Fixed incorrect computation of branch displacements,
    allowing arbitrary code execution (bsc#1184391).
  • CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop
    continually was finding the same bad inode (bsc#1184194).
  • CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509
    ).
  • CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering
    destruction of a large SEV VM (bsc#1184511).
  • CVE-2020-36310: Fixed infinite loop for certain nested page faults
    (bsc#1184512).
  • CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed
    multiple bugs in NFC subsytem (bsc#1178181).
  • CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem
    implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html



 Comments   
Comment by Gerrit Updater [ 05/May/21 ]

Jian Yu (yujian@whamcloud.com) uploaded a new patch: https://review.whamcloud.com/43549
Subject: LU-14671 kernel: kernel update SLES15 SP2 [5.3.18-24.61.1]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 11b39bebf4c3c35ed338f933ec5c0e14400cfede

Comment by Gerrit Updater [ 27/May/21 ]

Oleg Drokin (green@whamcloud.com) merged in patch https://review.whamcloud.com/43549/
Subject: LU-14671 kernel: kernel update SLES15 SP2 [5.3.18-24.61.1]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: a8d030e7dc20aa9076b1574b131bd80bc42030cf

Comment by Peter Jones [ 27/May/21 ]

Landed for 2.15

Generated at Sat Feb 10 03:11:46 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.