<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:51:26 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-12308] kernel update [SLES12 SP4 4.12.14-95.16.1] </title>
                <link>https://jira.whamcloud.com/browse/LU-12308</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   Four new speculative execution information leak issues have been&lt;br/&gt;
   identified in Intel CPUs. (bsc#1111331)&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)&lt;/li&gt;
	&lt;li&gt;CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)&lt;/li&gt;
	&lt;li&gt;CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory&lt;br/&gt;
     (MDSUM)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   This kernel update contains software mitigations for these issues, which&lt;br/&gt;
   also utilize CPU microcode updates shipped in parallel.&lt;/p&gt;


&lt;p&gt;   For more information on this set of vulnerabilities, check out&lt;br/&gt;
   &lt;a href=&quot;https://www.suse.com/support/kb/doc/?id=7023736&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.suse.com/support/kb/doc/?id=7023736&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2018-16880: A flaw was found in the handle_rx() function in the&lt;br/&gt;
     vhost_net driver. A malicious virtual guest, under specific conditions,&lt;br/&gt;
     could trigger an out-of-bounds write in a kmalloc-8 slab on a virtual&lt;br/&gt;
     host which may lead to a kernel memory corruption and a system panic.&lt;br/&gt;
     Due to the nature of the flaw, privilege escalation cannot be fully&lt;br/&gt;
     ruled out. (bnc#1122767).&lt;/li&gt;
	&lt;li&gt;CVE-2019-3882: A flaw was found in the vfio interface implementation&lt;br/&gt;
     that permitted violation of the user&apos;s locked memory limit. If a device&lt;br/&gt;
     is bound to a vfio driver, such as vfio-pci, and the local attacker is&lt;br/&gt;
     administratively granted ownership of the device, it may cause a system&lt;br/&gt;
     memory exhaustion and thus a denial of service (DoS). (bnc#1131416&lt;br/&gt;
     bnc#1131427).&lt;/li&gt;
	&lt;li&gt;CVE-2019-9003: Attackers could trigger a&lt;br/&gt;
     drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging&lt;br/&gt;
     for certain simultaneous execution of the code, as demonstrated by a&lt;br/&gt;
     &quot;service ipmievd restart&quot; loop (bnc#1126704).&lt;/li&gt;
	&lt;li&gt;CVE-2019-9500: A brcmfmac heap buffer overflow in brcmf_wowl_nd_results&lt;br/&gt;
     was fixed. (bnc#1132681).&lt;/li&gt;
	&lt;li&gt;CVE-2019-9503: A brcmfmac frame validation bypass was fixed.&lt;br/&gt;
     (bnc#1132828).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed: &lt;a href=&quot;http://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="55656">LU-12308</key>
            <summary>kernel update [SLES12 SP4 4.12.14-95.16.1] </summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Thu, 16 May 2019 07:13:55 +0000</created>
                <updated>Sun, 30 Jun 2019 19:04:36 +0000</updated>
                            <resolved>Sun, 30 Jun 2019 19:04:36 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="247360" author="gerrit" created="Sat, 18 May 2019 05:38:27 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/34899&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/34899&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12308&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.16.1] &quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12308&quot;&gt;&lt;del&gt;LU-12308&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.16.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 7144271c3cc48f1d636334ccb1f61ef547cc3e4a&lt;/p&gt;</comment>
                            <comment id="250388" author="yujian" created="Sun, 30 Jun 2019 19:04:36 +0000"  >&lt;p&gt;New kernel update is in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12494&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.19.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12494&quot;&gt;&lt;del&gt;LU-12494&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="55312">LU-12138</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="56231">LU-12494</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i00gdz:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>