<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:49:12 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-12046] kernel update [SLES12 SP3 4.4.175-94.79.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-12046</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.175 to receive&lt;br/&gt;
 various security and bugfixes.&lt;/p&gt;

&lt;p&gt;The following security bugs were fixed:&lt;/p&gt;
&lt;ul&gt;
	&lt;li&gt;CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled&lt;br/&gt;
 reference counting because of a race condition, leading to a&lt;br/&gt;
 use-after-free. (bnc#1124728)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM&lt;br/&gt;
 hypervisor related to the emulation of a preemption timer, allowing an&lt;br/&gt;
 guest user/process to crash the host kernel. (bsc#1124732).&lt;/li&gt;
	&lt;li&gt;CVE-2019-7222: Fixed an information leakage in the KVM hypervisor&lt;br/&gt;
 related to handling page fault exceptions, which allowed a guest&lt;br/&gt;
 user/process to use this flaw to leak the host&apos;s stack memory contents&lt;br/&gt;
 to a guest (bsc#1124735).&lt;/li&gt;
	&lt;li&gt;CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process&apos;s memory&lt;br/&gt;
 containing command line arguments (or environment strings), an attacker&lt;br/&gt;
 could have caused utilities from psutils or procps (such as ps, w) or&lt;br/&gt;
 any other program which made a read() call to the /proc/&amp;lt;pid&amp;gt;/cmdline&lt;br/&gt;
 (or /proc/&amp;lt;pid&amp;gt;/environ) files to block indefinitely (denial of service)&lt;br/&gt;
 or for some controlled time (as a synchronization primitive for other&lt;br/&gt;
 attacks) (bnc#1093158).&lt;/li&gt;
	&lt;li&gt;CVE-2018-16862: A security flaw was found in a way that the cleancache&lt;br/&gt;
 subsystem clears an inode after the final file truncation (removal). The&lt;br/&gt;
 new file created with the same inode may contain leftover pages from&lt;br/&gt;
 cleancache and the old file data instead of the new one (bnc#1117186).&lt;/li&gt;
	&lt;li&gt;CVE-2018-16884: NFS41+ shares mounted in different network namespaces at&lt;br/&gt;
 the same time can make bc_svc_process() use wrong back-channel IDs and&lt;br/&gt;
 cause a use-after-free vulnerability. Thus a malicious container user&lt;br/&gt;
 can cause a host kernel memory corruption and a system panic. Due to the&lt;br/&gt;
 nature of the flaw, privilege escalation cannot be fully ruled out&lt;br/&gt;
 (bnc#1119946).&lt;/li&gt;
	&lt;li&gt;CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c&lt;br/&gt;
 allowed local users to cause a denial of service (NULL pointer&lt;br/&gt;
 dereference and BUG) via crafted system calls that reach a situation&lt;br/&gt;
 where ioapic is uninitialized (bnc#1116841).&lt;/li&gt;
	&lt;li&gt;CVE-2018-19824: A local user could exploit a use-after-free in the ALSA&lt;br/&gt;
 driver by supplying a malicious USB Sound device (with zero interfaces)&lt;br/&gt;
 that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).&lt;/li&gt;
	&lt;li&gt;CVE-2018-19985: The function hso_probe read if_num from the USB device&lt;br/&gt;
 (as an u8) and used it without a length check to index an array,&lt;br/&gt;
 resulting in an OOB memory read in hso_probe or hso_get_config_data that&lt;br/&gt;
 could be used by local attackers (bnc#1120743).&lt;/li&gt;
	&lt;li&gt;CVE-2018-20169: The USB subsystem mishandled size checks during the&lt;br/&gt;
 reading of an extra descriptor, related to __usb_get_extra_descriptor in&lt;br/&gt;
 drivers/usb/core/usb.c (bnc#1119714).&lt;/li&gt;
	&lt;li&gt;CVE-2018-5391: The Linux kernel was vulnerable to a denial of service&lt;br/&gt;
 attack with low rates of specially modified packets targeting IP&lt;br/&gt;
 fragment re-assembly. An attacker may cause a denial of service&lt;br/&gt;
 condition by sending specially crafted IP fragments. Various&lt;br/&gt;
 vulnerabilities in IP fragmentation have been discovered and fixed over&lt;br/&gt;
 the years. The current vulnerability (CVE-2018-5391) became exploitable&lt;br/&gt;
 in the Linux kernel with the increase of the IP fragment reassembly&lt;br/&gt;
 queue size (bnc#1103097).&lt;/li&gt;
	&lt;li&gt;CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory&lt;br/&gt;
 corruption due to type confusion. This could lead to local escalation of&lt;br/&gt;
 privilege with no additional execution privileges needed. User&lt;br/&gt;
 interaction is not needed for exploitation. (bnc#1118319).&lt;/li&gt;
	&lt;li&gt;CVE-2019-3459,CVE-2019-3460: Two remote information leak vulnerabilities&lt;br/&gt;
 in the Bluetooth stack were fixed that could potentially leak kernel&lt;br/&gt;
 information (bsc#1120758)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;For fixed non-security bugs, please refer to:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="55070">LU-12046</key>
            <summary>kernel update [SLES12 SP3 4.4.175-94.79.1]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Wed, 6 Mar 2019 01:12:02 +0000</created>
                <updated>Mon, 1 Apr 2019 11:27:01 +0000</updated>
                            <resolved>Mon, 1 Apr 2019 11:27:01 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="243391" author="gerrit" created="Wed, 6 Mar 2019 06:50:35 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/34377&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/34377&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12046&quot; title=&quot;kernel update [SLES12 SP3 4.4.175-94.79.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12046&quot;&gt;&lt;del&gt;LU-12046&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES12 SP3 4.4.175-94.79&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 40c6cb5141ba68de31abca18682def685fa0c4cb&lt;/p&gt;</comment>
                            <comment id="245017" author="yujian" created="Mon, 1 Apr 2019 11:27:01 +0000"  >&lt;p&gt;A more newer SLES12 SP3 kernel update is being worked in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12139&quot; title=&quot;kernel update [SLES12 SP3 4.4.176-94.88.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12139&quot;&gt;&lt;del&gt;LU-12139&lt;/del&gt;&lt;/a&gt;. Let&apos;s close this ticket.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="53995">LU-11652</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="55313">LU-12139</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i00cs7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>