<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:55:42 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-12793] kernel update [SLES12 SP4 4.12.14-95.32.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-12793</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   The following new features were implemented:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;jsc#SLE-4875: &lt;span class=&quot;error&quot;&gt;&amp;#91;CML&amp;#93;&lt;/span&gt; New device IDs for CML&lt;/li&gt;
	&lt;li&gt;jsc#SLE-7294: Add cpufreq driver for Raspberry Pi&lt;/li&gt;
	&lt;li&gt;fate#322438: Integrate P9 XIVE support (on PowerVM only)&lt;/li&gt;
	&lt;li&gt;fate#322447: Add memory protection keys (MPK) support on POWER (on&lt;br/&gt;
     PowerVM only)&lt;/li&gt;
	&lt;li&gt;fate#322448, fate#321438: P9 hardware counter (performance counters)&lt;br/&gt;
     support (on PowerVM only)&lt;/li&gt;
	&lt;li&gt;fate#325306, fate#321840: Reduce memory required to boot capture kernel&lt;br/&gt;
     while using fadump&lt;/li&gt;
	&lt;li&gt;fate#326869: perf: pmu mem_load/store event support&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2017-18551: There was an out of bounds write in the function&lt;br/&gt;
     i2c_smbus_xfer_emulated. (bsc#1146163).&lt;/li&gt;
	&lt;li&gt;CVE-2018-20976: A use after free existed, related to xfs_fs_fill_super&lt;br/&gt;
     failure. (bsc#1146285)&lt;/li&gt;
	&lt;li&gt;CVE-2018-21008: A use-after-free can be caused by the function&lt;br/&gt;
     rsi_mac80211_detach (bsc#1149591).&lt;/li&gt;
	&lt;li&gt;CVE-2019-9456: In Pixel C USB monitor driver there was a possible OOB&lt;br/&gt;
     write due to a missing bounds check. This could have lead to local&lt;br/&gt;
     escalation of privilege with System execution privileges needed.&lt;br/&gt;
     (bsc#1150025 CVE-2019-9456).&lt;/li&gt;
	&lt;li&gt;CVE-2019-10207: Fix a NULL pointer dereference in hci_uart bluetooth&lt;br/&gt;
     driver (bsc#1142857 bsc#1123959).&lt;/li&gt;
	&lt;li&gt;CVE-2019-14814, CVE-2019-14815, CVE-2019-14816: Fix three heap-based&lt;br/&gt;
     buffer overflows in marvell wifi chip driver kernel, that allowed local&lt;br/&gt;
     users to cause a denial of service (system crash) or possibly execute&lt;br/&gt;
     arbitrary code. (bnc#1146516)&lt;/li&gt;
	&lt;li&gt;CVE-2019-14835: Fix QEMU-KVM Guest to Host Kernel Escape. (bsc#1150112).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15030, CVE-2019-15031: On the powerpc platform, a local user&lt;br/&gt;
     could read vector registers of other users&apos; processes via an interrupt.&lt;br/&gt;
     (bsc#1149713)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15090: In the qedi_dbg_* family of functions, there was an&lt;br/&gt;
     out-of-bounds read. (bsc#1146399)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15098: USB driver net/wireless/ath/ath6kl/usb.c had a NULL&lt;br/&gt;
     pointer dereference via an incomplete address in an endpoint descriptor.&lt;br/&gt;
     (bsc#1146378).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15099: drivers/net/wireless/ath/ath10k/usb.c had a NULL pointer&lt;br/&gt;
     dereference via an incomplete address in an endpoint descriptor.&lt;br/&gt;
     (bsc#1146368)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15117: parse_audio_mixer_unit in sound/usb/mixer.c in the Linux&lt;br/&gt;
     kernel mishandled a short descriptor, leading to out-of-bounds memory&lt;br/&gt;
     access. (bsc#1145920).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15118: check_input_term in sound/usb/mixer.c in the Linux&lt;br/&gt;
     kernel mishandled recursion, leading to kernel stack exhaustion.&lt;br/&gt;
     (bsc#1145922).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15211: There was a use-after-free caused by a malicious USB&lt;br/&gt;
     device in the drivers/media/v4l2-core/v4l2-dev.c driver because&lt;br/&gt;
     drivers/media/radio/radio-raremono.c did not properly allocate memory.&lt;br/&gt;
     (bsc#1146519).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15212: There was a double-free caused by a malicious USB device&lt;br/&gt;
     in the drivers/usb/misc/rio500.c driver. (bsc#1051510 bsc#1146391).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15214: There was a use-after-free in the sound subsystem&lt;br/&gt;
     because card disconnection causes certain data structures to be deleted&lt;br/&gt;
     too early. (bsc#1146550)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15215: There was a use-after-free caused by a malicious USB&lt;br/&gt;
     device in the drivers/media/usb/cpia2/cpia2_usb.c driver. (bsc#1135642&lt;br/&gt;
     bsc#1146425)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15216: Fix a NULL pointer dereference caused by a malicious USB&lt;br/&gt;
     device in the drivers/usb/misc/yurex.c driver. (bsc#1146361).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15217: There was a NULL pointer dereference caused by a&lt;br/&gt;
     malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.&lt;br/&gt;
     (bsc#1146547).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15218: There was a NULL pointer dereference caused by a&lt;br/&gt;
     malicious USB device in the drivers/media/usb/siano/smsusb.c driver.&lt;br/&gt;
     (bsc#1051510 bsc#1146413)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15219: There was a NULL pointer dereference caused by a&lt;br/&gt;
     malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.&lt;br/&gt;
     (bsc#1146524)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15220: There was a use-after-free caused by a malicious USB&lt;br/&gt;
     device in the drivers/net/wireless/intersil/p54/p54usb.c driver.&lt;br/&gt;
     (bsc#1146526)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15221, CVE-2019-15222: There was a NULL pointer dereference&lt;br/&gt;
     caused by a malicious USB device in the sound/usb/line6/pcm.c driver.&lt;br/&gt;
     (bsc#1146529, bsc#1146531)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15239: An incorrect backport of a certain net/ipv4/tcp_output.c&lt;br/&gt;
     fix allowed a local attacker to trigger multiple use-after-free&lt;br/&gt;
     conditions. This could result in a kernel crash, or potentially in&lt;br/&gt;
     privilege escalation. (bsc#1146589)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15290: There was a NULL pointer dereference caused by a&lt;br/&gt;
     malicious USB device in the ath6kl_usb_alloc_urb_from_pipe function&lt;br/&gt;
     (bsc#1146543).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15292: There was a use-after-free in atalk_proc_exit&lt;br/&gt;
     (bsc#1146678)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15538: XFS partially wedged when a chgrp failed on account of&lt;br/&gt;
     being out of disk quota. This was primarily a local DoS attack vector,&lt;br/&gt;
     but it could result as well in remote DoS if the XFS filesystem was&lt;br/&gt;
     exported for instance via NFS. (bsc#1148032, bsc#1148093)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15666: There was an out-of-bounds array access in&lt;br/&gt;
     __xfrm_policy_unlink, which would cause denial of service, because&lt;br/&gt;
     verify_newpolicy_info mishandled directory validation. (bsc#1148394).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15902: A backporting error reintroduced the Spectre&lt;br/&gt;
     vulnerability that it aimed to eliminate. (bnc#1149376)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15917: There was a use-after-free issue when&lt;br/&gt;
     hci_uart_register_dev() failed in hci_uart_set_proto() (bsc#1149539)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15919: SMB2_write in fs/cifs/smb2pdu.c had a use-after-free.&lt;br/&gt;
     (bsc#1149552)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15920: SMB2_read in fs/cifs/smb2pdu.c had a use-after-free.&lt;br/&gt;
     (bsc#1149626)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15921: There was a memory leak issue when idr_alloc() failed&lt;br/&gt;
     (bsc#1149602)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15924: Fix a NULL pointer dereference because there was no&lt;br/&gt;
     -ENOMEM upon an alloc_workqueue failure. (bsc#1149612).&lt;/li&gt;
	&lt;li&gt;CVE-2019-15926: Out of bounds access existed in the functions&lt;br/&gt;
     ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx&lt;br/&gt;
     (bsc#1149527)&lt;/li&gt;
	&lt;li&gt;CVE-2019-15927: An out-of-bounds access existed in the function&lt;br/&gt;
     build_audio_procunit (bsc#1149522)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;http://lists.suse.com/pipermail/sle-security-updates/2019-September/005942.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://lists.suse.com/pipermail/sle-security-updates/2019-September/005942.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="56963">LU-12793</key>
            <summary>kernel update [SLES12 SP4 4.12.14-95.32.1]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Fri, 20 Sep 2019 18:00:16 +0000</created>
                <updated>Tue, 5 Nov 2019 19:43:57 +0000</updated>
                            <resolved>Tue, 5 Nov 2019 19:43:57 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="255171" author="gerrit" created="Fri, 20 Sep 2019 20:38:44 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/36249&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/36249&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12793&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.32.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12793&quot;&gt;&lt;del&gt;LU-12793&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.32.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: ec848be68842eb660e5bb55eda64c92dbd3941c5&lt;/p&gt;</comment>
                            <comment id="255172" author="gerrit" created="Fri, 20 Sep 2019 20:42:16 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/36250&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/36250&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12793&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.32.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12793&quot;&gt;&lt;del&gt;LU-12793&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.32.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_12&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 015547629df5931c1d76a56cdd196f2671183262&lt;/p&gt;</comment>
                            <comment id="257768" author="yujian" created="Tue, 5 Nov 2019 19:43:57 +0000"  >&lt;p&gt;New kernel version was released: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-12940&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.37.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-12940&quot;&gt;&lt;del&gt;LU-12940&lt;/del&gt;&lt;/a&gt;&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="56647">LU-12660</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="57318">LU-12940</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i00n33:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>