<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:43:39 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-11412] kernel update [SLES12 SP3 4.4.155-94.50.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-11412</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.155 to receive various security and bugfixes.&lt;/p&gt;

&lt;p&gt;The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2018-13093: Prevent NULL pointer dereference and panic in&lt;br/&gt;
     lookup_slow()&lt;br/&gt;
     on a NULL inode-&amp;gt;i_ops pointer when doing pathwalks on a corrupted xfs&lt;br/&gt;
      image. This occured because of a lack of proper validation that cached&lt;br/&gt;
      inodes are free during allocation (bnc#1100001).&lt;/li&gt;
	&lt;li&gt;CVE-2018-13095: Prevent denial of service (memory corruption and BUG)&lt;br/&gt;
     that could have occurred for a corrupted xfs image upon encountering an&lt;br/&gt;
     inode that is in extent format, but has more extents than fit in the&lt;br/&gt;
     inode fork (bnc#1099999).&lt;/li&gt;
	&lt;li&gt;CVE-2018-13094: Prevent OOPS that may have occured for a corrupted xfs&lt;br/&gt;
     image after xfs_da_shrink_inode() is called with a NULL bp (bnc#1100000).&lt;/li&gt;
	&lt;li&gt;CVE-2018-12896: Prevent integer overflow in the POSIX timer code that&lt;br/&gt;
     was caused by the way the overrun accounting works. Depending on&lt;br/&gt;
     interval and expiry time values, the overrun can be larger than INT_MAX,&lt;br/&gt;
     but the accounting is int based. This basically made the accounting&lt;br/&gt;
     values, which are visible to user space via timer_getoverrun(2) and&lt;br/&gt;
     siginfo::si_overrun, random. This allowed a local user to cause a denial&lt;br/&gt;
     of service (signed integer overflow) via crafted mmap, futex,&lt;br/&gt;
     timer_create, and timer_settime system calls (bnc#1099922).&lt;/li&gt;
	&lt;li&gt;CVE-2018-16658: Prevent information leak in cdrom_ioctl_drive_status&lt;br/&gt;
     that could have been used by local attackers to read kernel memory&lt;br/&gt;
     (bnc#1107689).&lt;/li&gt;
	&lt;li&gt;CVE-2018-6555: The irda_setsockopt function allowed local users to cause&lt;br/&gt;
     a denial of service (ias_object use-after-free and system crash) or&lt;br/&gt;
     possibly have unspecified other impact via an AF_IRDA socket&lt;br/&gt;
     (bnc#1106511).&lt;/li&gt;
	&lt;li&gt;CVE-2018-6554: Prevent memory leak in the irda_bind function that&lt;br/&gt;
     allowed local users to cause a denial of service (memory consumption) by&lt;br/&gt;
     repeatedly binding an AF_IRDA socket (bnc#1106509).&lt;/li&gt;
	&lt;li&gt;CVE-2018-1129: A flaw was found in the way signature calculation was&lt;br/&gt;
     handled by cephx authentication protocol. An attacker having access to&lt;br/&gt;
     ceph cluster network who is able to alter the message payload was able&lt;br/&gt;
     to bypass signature checks done by cephx protocol (bnc#1096748).&lt;/li&gt;
	&lt;li&gt;CVE-2018-1128: It was found that cephx authentication protocol did not&lt;br/&gt;
     verify ceph clients correctly and was vulnerable to replay attack. Any&lt;br/&gt;
     attacker having access to ceph cluster network who is able to sniff&lt;br/&gt;
     packets on network can use this vulnerability to authenticate with ceph&lt;br/&gt;
     service and perform actions allowed by ceph service (bnc#1096748).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10938: A crafted network packet sent remotely by an attacker&lt;br/&gt;
     forced the kernel to enter an infinite loop in the cipso_v4_optptr()&lt;br/&gt;
     function leading to a denial-of-service (bnc#1106016).&lt;/li&gt;
	&lt;li&gt;CVE-2018-15572: The spectre_v2_select_mitigation function did not always&lt;br/&gt;
     fill RSB upon a context switch, which made it easier for attackers to&lt;br/&gt;
     conduct userspace-userspace spectreRSB attacks (bnc#1102517).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10902: Protect against concurrent access to prevent double&lt;br/&gt;
     realloc (double free) in snd_rawmidi_input_params() and&lt;br/&gt;
     snd_rawmidi_output_status(). A malicious local attacker could have used&lt;br/&gt;
     this for privilege escalation (bnc#1105322 1105323).&lt;/li&gt;
	&lt;li&gt;CVE-2018-9363: Prevent buffer overflow in hidp_process_report&lt;br/&gt;
     (bsc#1105292)&lt;/li&gt;
	&lt;li&gt;CVE-2018-10883: A local user could have caused an out-of-bounds write in&lt;br/&gt;
     jbd2_journal_dirty_metadata(), a denial of service, and a system crash&lt;br/&gt;
     by mounting and operating on a crafted ext4 filesystem image&lt;br/&gt;
     (bsc#1099863).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10879: A local user could have caused a use-after-free in&lt;br/&gt;
     ext4_xattr_set_entry function and a denial of service or unspecified&lt;br/&gt;
     other impact by renaming a file in a crafted ext4 filesystem image&lt;br/&gt;
     (bsc#1099844).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10878: A local user could have caused an out-of-bounds write&lt;br/&gt;
     and a denial of service or unspecified other impact by mounting and&lt;br/&gt;
     operating a crafted ext4 filesystem image (bsc#1099813).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10876: A use-after-free was possible in ext4_ext_remove_space()&lt;br/&gt;
     function when mounting and operating a crafted ext4 image (bsc#1099811).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10877: Prevent out-of-bound access in the ext4_ext_drop_refs()&lt;br/&gt;
     function when operating on a crafted ext4 filesystem image (bsc#1099846).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10881: A local user could have caused an out-of-bound access in&lt;br/&gt;
     ext4_get_group_info function, a denial of service, and a system crash by&lt;br/&gt;
     mounting and operating on a crafted ext4 filesystem image (bsc#1099864).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10882: A local user could have caused an out-of-bound write, a&lt;br/&gt;
     denial of service, and a system crash by unmounting a crafted ext4&lt;br/&gt;
     filesystem image (bsc#1099849).&lt;/li&gt;
	&lt;li&gt;CVE-2018-10880: Prevent stack-out-of-bounds write in the ext4 filesystem&lt;br/&gt;
     code when mounting and writing to a crafted ext4 image in&lt;br/&gt;
     ext4_update_inline_data(). An attacker could have used this to cause a&lt;br/&gt;
     system crash and a denial of service (bsc#1099845).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For fixed non-security bugs, please refer to:&lt;br/&gt;
&lt;a href=&quot;http://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="53380">LU-11412</key>
            <summary>kernel update [SLES12 SP3 4.4.155-94.50.1]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="3" iconUrl="https://jira.whamcloud.com/images/icons/priorities/major.svg">Major</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Fri, 21 Sep 2018 06:09:09 +0000</created>
                <updated>Sat, 10 Nov 2018 08:07:07 +0000</updated>
                            <resolved>Sat, 6 Oct 2018 06:26:09 +0000</resolved>
                                                    <fixVersion>Lustre 2.12.0</fixVersion>
                    <fixVersion>Lustre 2.10.6</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>6</watches>
                                                                            <comments>
                            <comment id="233997" author="gerrit" created="Wed, 26 Sep 2018 07:19:27 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/33236&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/33236&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-11412&quot; title=&quot;kernel update [SLES12 SP3 4.4.155-94.50.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-11412&quot;&gt;&lt;del&gt;LU-11412&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES12 SP3 4.4.155-94.50&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 8c53432deb4d70b953fbd31f5006d4c02c4ee2d1&lt;/p&gt;</comment>
                            <comment id="234518" author="gerrit" created="Sat, 6 Oct 2018 03:59:40 +0000"  >&lt;p&gt;Oleg Drokin (green@whamcloud.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/33236/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/33236/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-11412&quot; title=&quot;kernel update [SLES12 SP3 4.4.155-94.50.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-11412&quot;&gt;&lt;del&gt;LU-11412&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES12 SP3 4.4.155-94.50&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 937d72acf48f9d7cc2e382ac98c1d37c1f5fb1df&lt;/p&gt;</comment>
                            <comment id="234520" author="yujian" created="Sat, 6 Oct 2018 06:26:09 +0000"  >&lt;p&gt;Patch landed to master branch for Lustre 2.12.0.&lt;/p&gt;</comment>
                            <comment id="234545" author="gerrit" created="Sat, 6 Oct 2018 16:30:29 +0000"  >&lt;p&gt;Minh Diep (mdiep@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/33313&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/33313&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-11412&quot; title=&quot;kernel update [SLES12 SP3 4.4.155-94.50.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-11412&quot;&gt;&lt;del&gt;LU-11412&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES12 SP3 4.4.155-94.50&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_10&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 7e99e53950ac4be2916c4e6fa83d3ab70ebc0f17&lt;/p&gt;</comment>
                            <comment id="235047" author="gerrit" created="Wed, 17 Oct 2018 16:05:30 +0000"  >&lt;p&gt;John L. Hammond (jhammond@whamcloud.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/33313/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/33313/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-11412&quot; title=&quot;kernel update [SLES12 SP3 4.4.155-94.50.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-11412&quot;&gt;&lt;del&gt;LU-11412&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES12 SP3 4.4.155-94.50&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_10&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: eefc9f70e3dc3b6770a41aad3f8f35489c98dc53&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10010">
                    <name>Duplicate</name>
                                                                <inwardlinks description="is duplicated by">
                                        <issuelink>
            <issuekey id="53345">LU-11395</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="52984">LU-11255</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="53995">LU-11652</issuekey>
        </issuelink>
            <issuelink>
            <issuekey id="53349">LU-11396</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i002uf:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>