<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:53:04 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-12494] kernel update [SLES12 SP4 4.12.14-95.19.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-12494</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2019-11477: A sequence of SACKs may have been crafted such that one&lt;br/&gt;
     can trigger an integer overflow, leading to a kernel panic.&lt;/li&gt;
	&lt;li&gt;CVE-2019-11478: It was possible to send a crafted sequence of SACKs&lt;br/&gt;
     which will fragment the TCP retransmission queue. An attacker may have&lt;br/&gt;
     been able to further exploit the fragmented queue to cause an expensive&lt;br/&gt;
     linked-list walk for subsequent SACKs received for that same TCP&lt;br/&gt;
     connection.&lt;/li&gt;
	&lt;li&gt;CVE-2019-11479: An attacker could force the Linux kernel to segment its&lt;br/&gt;
     responses into multiple TCP segments. This would drastically increased&lt;br/&gt;
     the bandwidth required to deliver the same amount of data. Further, it&lt;br/&gt;
     would consume additional resources such as CPU and NIC processing power.&lt;/li&gt;
	&lt;li&gt;CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and&lt;br/&gt;
     possibly escalate privileges was found in the mwifiex kernel module&lt;br/&gt;
     while connecting to a malicious wireless network. (bnc#1136424)&lt;/li&gt;
	&lt;li&gt;CVE-2019-12382: An issue was discovered in drm_load_edid_firmware in&lt;br/&gt;
     drivers/gpu/drm/drm_edid_load.c in the Linux kernel, there was an&lt;br/&gt;
     unchecked kstrdup of fwstr, which might have allowed an attacker to&lt;br/&gt;
     cause a denial of service (NULL pointer dereference and system crash).&lt;br/&gt;
     (bnc#1136586)&lt;/li&gt;
	&lt;li&gt;CVE-2019-5489: The mincore() implementation in mm/mincore.c in the Linux&lt;br/&gt;
     kernel allowed local attackers to observe page cache access patterns of&lt;br/&gt;
     other processes on the same system, potentially allowing sniffing of&lt;br/&gt;
     secret information. (Fixing this affects the output of the fincore&lt;br/&gt;
     program.) Limited remote exploitation may have been possible, as&lt;br/&gt;
     demonstrated by latency differences in accessing public files from an&lt;br/&gt;
     Apache HTTP Server. (bnc#1120843)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11487: The Linux kernel allowed page reference count overflow,&lt;br/&gt;
     with resultant use-after-free issues, if about 140 GiB of RAM existed.&lt;br/&gt;
     It could have occured with FUSE requests. (bnc#1133190)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11833: fs/ext4/extents.c in the Linux kernel did not zero out&lt;br/&gt;
     the unused memory region in the extent tree block, which might have&lt;br/&gt;
     allowed local users to obtain sensitive information by reading&lt;br/&gt;
     uninitialized data in the filesystem. (bnc#1135281)&lt;/li&gt;
	&lt;li&gt;CVE-2018-7191: In the tun subsystem in the Linux kernel,&lt;br/&gt;
     dev_get_valid_name was not called before register_netdevice. This&lt;br/&gt;
     allowed local users to cause a denial of service (NULL pointer&lt;br/&gt;
     dereference and panic) via an ioctl(TUNSETIFF) call with a dev name&lt;br/&gt;
     containing a / character. (bnc#1135603)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11085: Insufficient input validation in Kernel Mode Driver in&lt;br/&gt;
     i915 Graphics for Linux may have allowed an authenticated user to&lt;br/&gt;
     potentially enable escalation of privilege via local access.&lt;br/&gt;
     (bnc#1135278)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11815: An issue was discovered in rds_tcp_kill_sock in&lt;br/&gt;
     net/rds/tcp.c in the Linux kernel There was a race condition leading to&lt;br/&gt;
     a use-after-free, related to net namespace cleanup. (bnc#1134537)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11884: The do_hidp_sock_ioctl function in&lt;br/&gt;
     net/bluetooth/hidp/sock.c in the Linux kernel allowed a local user to&lt;br/&gt;
     obtain potentially sensitive information from kernel stack memory via a&lt;br/&gt;
     hidPCONNADD command, because a name field may not end with a &apos;\0&apos;&lt;br/&gt;
     character. (bnc#1134848)&lt;/li&gt;
	&lt;li&gt;CVE-2019-11486: The Siemens R3964 line discipline driver in&lt;br/&gt;
     drivers/tty/n_r3964.c in the Linux kernel had multiple race conditions.&lt;br/&gt;
     (bnc#1133188)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;The following non-security bugs were fixed: &lt;a href=&quot;http://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="56231">LU-12494</key>
            <summary>kernel update [SLES12 SP4 4.12.14-95.19.1]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Sat, 29 Jun 2019 19:11:06 +0000</created>
                <updated>Tue, 16 Jul 2019 18:07:15 +0000</updated>
                            <resolved>Wed, 10 Jul 2019 20:25:24 +0000</resolved>
                                                    <fixVersion>Lustre 2.13.0</fixVersion>
                    <fixVersion>Lustre 2.12.3</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="250387" author="gerrit" created="Sun, 30 Jun 2019 18:58:01 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/35391&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/35391&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12494&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.19.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12494&quot;&gt;&lt;del&gt;LU-12494&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: dab934908908f252f3aa64bb6fd26bc244b22729&lt;/p&gt;</comment>
                            <comment id="250638" author="gerrit" created="Wed, 3 Jul 2019 19:29:36 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/35413&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/35413&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12494&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.19.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12494&quot;&gt;&lt;del&gt;LU-12494&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_12&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: a2b8a7563c599f52eaa4211ddfb18de226009b21&lt;/p&gt;</comment>
                            <comment id="250951" author="gerrit" created="Wed, 10 Jul 2019 15:18:30 +0000"  >&lt;p&gt;Oleg Drokin (green@whamcloud.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/35391/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/35391/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12494&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.19.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12494&quot;&gt;&lt;del&gt;LU-12494&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: af08a447fc7b38bd8261db99fefe18288a654978&lt;/p&gt;</comment>
                            <comment id="250969" author="pjones" created="Wed, 10 Jul 2019 20:25:24 +0000"  >&lt;p&gt;Landed for 2.13&lt;/p&gt;</comment>
                            <comment id="251213" author="gerrit" created="Fri, 12 Jul 2019 05:26:08 +0000"  >&lt;p&gt;Oleg Drokin (green@whamcloud.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/35413/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/35413/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12494&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.19.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12494&quot;&gt;&lt;del&gt;LU-12494&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_12&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: fe9d9b62a8564a05f8252beef968d0f90f89793e&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="55656">LU-12308</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="56424">LU-12556</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i00iyn:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>