[LU-9148] kernel update [RHEL6.8 2.6.32-642.15.1.el6] Created: 23/Feb/17  Updated: 16/Sep/17  Resolved: 26/Apr/17

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.10.0

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Duplicate
is duplicated by LU-2586 Need a way to request "good to have" ... Resolved
Related
is related to LU-9144 kernel update [RHEL6.8 2.6.32-642.13.... Resolved
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   

Security Fix(es):

  • When creating audit records for parameters to executed children processes, an
    attacker can convince the Linux kernel audit subsystem can create corrupt
    records which may allow an attacker to misrepresent or evade logging of
    executing commands. (CVE-2016-6136, Moderate)
  • A flaw was found in the Linux kernel's implementation of the SCTP protocol. A
    remote attacker could trigger an out-of-bounds read with an offset of up to 64kB
    potentially causing the system to crash. (CVE-2016-9555, Moderate)

Bug Fix(es):

  • The qlnic driver previously attempted to fetch pending transmission
    descriptors before all writes were complete, which lead to firmware hangs. With
    this update, the qlcnic driver has been fixed to complete all writes before the
    hardware fetches any pending transmission descriptors. As a result, the firmware
    no longer hangs with the qlcnic driver. (BZ#1403143)
  • Previously, when a NFS share was mounted, the file-system (FS) cache was
    incorrectly enabled even when the "-o fsc" option was not used in the mount
    command. Consequently, the cachefilesd service stored files in the NFS share
    even when not instructed to by the user. With this update, NFS does not use the
    FS cache if not instructed by the "-o fsc" option. As a result, NFS no longer
    enables caching if the "-o fsc" option is not used. (BZ#1399172)
  • Previously, an NFS client and NFS server got into a NFS4 protocol loop
    involving a WRITE action and a NFS4ERR_EXPIRED response when the current_fileid
    counter got to the wraparound point by overflowing the value of 32 bits. This
    update fixes the NFS server to handle the current_fileid wraparound. As a
    result, the described NFS4 protocol loop no longer occurs. (BZ#1399174)
  • Previously, certain configurations of the Hewlett Packard Smart Array (HPSA)
    devices caused hardware to be set offline incorrectly when the HPSA driver was
    expected to wait for existing I/O operations to complete. Consequently, a kernel
    panic occurred. This update prevents the described problem. As a result, the
    kernel panic no longer occurs. (BZ#1399175)
  • Previously, memory corruption by copying data into the wrong memory locations
    sometimes occurred, because the __copy_tofrom_user() function was returning
    incorrect values. This update fixes the __copy_tofrom_user() function so that it
    no longer returns larger values than the number of bytes it was asked to copy.
    As a result, memory corruption no longer occurs in he described scenario.
    (BZ#1398185)
  • Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in
    some cases rebooted during the graceful node failover test, because the host
    kept sending heartbeat packets independently of guests responding to them. This
    update fixes the bug by properly responding to all the heartbeat messages in the
    queue, even if they are pending. As a result, guest VMs no longer get rebooted
    under the described circumstances. (BZ#1397739)
  • When the "punching hole" feature of the fallocate utility was used on an ext4
    file system inode with extent depth of 1, the extent tree of the inode sometimes
    became corrupted. With this update, the underlying source code has been fixed,
    and extent tree corruption no longer occurs in the described situation.
    (BZ#1397808)

Bugs fixed (https://bugzilla.redhat.com/):

1353533 - CVE-2016-6136 kernel: Race condition vulnerability in execve argv arguments
1397930 - CVE-2016-9555 kernel: Slab out-of-bounds access in sctp_sf_ootb()



 Comments   
Comment by Gerrit Updater [ 25/Feb/17 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: https://review.whamcloud.com/25633
Subject: LU-9148 kernel: kernel update RHEL6.8 [2.6.32-642.15.1.el6]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: a913a5dc09aac4854146d0553e275db7f901592a

Comment by Oleg Drokin [ 03/Mar/17 ]

this one does not look like it fies anything critical security-wise.

Comment by Gerrit Updater [ 26/Apr/17 ]

Oleg Drokin (oleg.drokin@intel.com) merged in patch https://review.whamcloud.com/25633/
Subject: LU-9148 kernel: kernel update RHEL6.8 [2.6.32-642.15.1.el6]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: a168a6c1d5a7ba6322a8f7ecc3fbb3ffb855c80a

Comment by Peter Jones [ 26/Apr/17 ]

Landed for 2.10

Generated at Sat Feb 10 02:23:39 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.