<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:07:53 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-14220] kernel update [SLES12 SP4 4.12.14-95.65.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-14220</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various&lt;br/&gt;
   security and bug fixes.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was&lt;br/&gt;
     found that allowed to quickly scan open UDP ports. This flaw allowed an&lt;br/&gt;
     off-path remote user to effectively bypassing source port UDP&lt;br/&gt;
     randomization. The highest threat from this vulnerability is to&lt;br/&gt;
     confidentiality and possibly integrity, because software and services&lt;br/&gt;
     that rely on UDP source port randomization (like DNS) are indirectly&lt;br/&gt;
     affected as well. Kernel versions may be vulnerable to this issue&lt;br/&gt;
     (bsc#1175721, bsc#1178782).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter()&lt;br/&gt;
     (bsc#1178393).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25668: Fixed a use-after-free in con_font_op() (bnc#1178123).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl&lt;br/&gt;
     (bnc#1177766).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers&lt;br/&gt;
     in mm/hugetlb.c (bnc#1176485).&lt;/li&gt;
	&lt;li&gt;CVE-2020-0430: Fixed an OOB read in skb_headlen of&lt;br/&gt;
     /include/linux/skbuff.h (bnc#1176723).&lt;/li&gt;
	&lt;li&gt;CVE-2020-14351: Fixed a race in the perf_mmap_close() function&lt;br/&gt;
     (bsc#1177086).&lt;/li&gt;
	&lt;li&gt;CVE-2020-16120: Fixed a permissions issue in ovl_path_open()&lt;br/&gt;
     (bsc#1177470).&lt;/li&gt;
	&lt;li&gt;CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).&lt;/li&gt;
	&lt;li&gt;CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops&lt;br/&gt;
     filter addition (bsc#1177724).&lt;/li&gt;
	&lt;li&gt;CVE-2020-12352: Fixed an information leak when processing certain AMP&lt;br/&gt;
     packets aka &quot;BleedingTooth&quot; (bsc#1177725).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code&lt;br/&gt;
     (bnc#1176381).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between&lt;br/&gt;
     two Geneve endpoints to be unencrypted (bnc#1177511).&lt;/li&gt;
	&lt;li&gt;CVE-2020-14381: Fixed a UAF in the fast user mutex (futex) wait&lt;br/&gt;
     operation (bsc#1176011).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25643: Fixed an improper input validation in the&lt;br/&gt;
     ppp_cp_parse_cr function of the HDLC_PPP module (bnc#1177206).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25641: Fixed a zero-length biovec request issued by the block&lt;br/&gt;
     subsystem could have caused the kernel to enter an infinite loop,&lt;br/&gt;
     causing a denial of service (bsc#1177121).&lt;/li&gt;
	&lt;li&gt;CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket&lt;br/&gt;
     creation could have been used by local attackers to create raw sockets,&lt;br/&gt;
     bypassing security mechanisms (bsc#1176990).&lt;/li&gt;
	&lt;li&gt;CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory&lt;br/&gt;
     corruption or a denial of service when changing screen size&lt;br/&gt;
     (bnc#1176235).&lt;/li&gt;
	&lt;li&gt;CVE-2020-0432: Fixed an out of bounds write due to an integer overflow&lt;br/&gt;
     (bsc#1176721).&lt;/li&gt;
	&lt;li&gt;CVE-2020-0427: Fixed an out of bounds read due to a use after free&lt;br/&gt;
     (bsc#1176725).&lt;/li&gt;
	&lt;li&gt;CVE-2020-0431: Fixed an out of bounds write due to a missing bounds&lt;br/&gt;
     check (bsc#1176722).&lt;/li&gt;
	&lt;li&gt;CVE-2020-0404: Fixed a linked list corruption due to an unusual root&lt;br/&gt;
     cause (bsc#1176423).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25284: Fixed an incomplete permission checking for access to&lt;br/&gt;
     rbd devices, which could have been leveraged by local attackers to map&lt;br/&gt;
     or unmap rbd block devices (bsc#1176482).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27673: Fixed an issue where rogue guests could have caused&lt;br/&gt;
     denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)&lt;/li&gt;
	&lt;li&gt;CVE-2020-27675: Fixed a race condition in event handler which may crash&lt;br/&gt;
     dom0 (XSA-331 bsc#1177410).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2020-November/007878.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2020-November/007878.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="62003">LU-14220</key>
            <summary>kernel update [SLES12 SP4 4.12.14-95.65.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Tue, 15 Dec 2020 19:34:16 +0000</created>
                <updated>Fri, 18 Dec 2020 07:16:21 +0000</updated>
                            <resolved>Fri, 18 Dec 2020 07:16:21 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="287933" author="gerrit" created="Thu, 17 Dec 2020 19:43:59 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/41035&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/41035&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14220&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.65.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14220&quot;&gt;&lt;del&gt;LU-14220&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.65.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 699bd4673c205fb6ccffc4a66d9fb4c20a2bc3e5&lt;/p&gt;</comment>
                            <comment id="287935" author="gerrit" created="Thu, 17 Dec 2020 19:56:03 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/41036&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/41036&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14220&quot; title=&quot;kernel update [SLES12 SP4 4.12.14-95.65.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14220&quot;&gt;&lt;del&gt;LU-14220&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES12 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;4.12.14-95.65.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_12&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: c534c3ef64b45266f8e5c43d585d7adc599912ce&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="60282">LU-13860</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i01h8f:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>