<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:11:46 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-14671] kernel update [SLES15 SP2 5.3.18-24.61.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-14671</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various&lt;br/&gt;
 security and bugfixes.&lt;/p&gt;

&lt;p&gt;The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2021-3444: Fixed an issue with the bpf verifier which did not&lt;br/&gt;
 properly handle mod32 destination register truncation when the source&lt;br/&gt;
 register was known to be 0 leading to out of bounds read (bsc#1184170).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent&lt;br/&gt;
 (bsc#1173485).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed&lt;br/&gt;
 attackers to obtain sensitive information from kernel memory because of&lt;br/&gt;
 a partially uninitialized data structure (bsc#1184192 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have&lt;br/&gt;
 allowed attackers to cause a denial of service due to race conditions&lt;br/&gt;
 during an update of the local and shared status (bsc#1184167).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver&lt;br/&gt;
 which could have allowed attackers to cause a system crash due to a&lt;br/&gt;
 calculation of negative fragment size (bsc#1184168).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a&lt;br/&gt;
 new device name to the driver from userspace, allowing userspace to&lt;br/&gt;
 write data to the kernel stack frame directly (bsc#1184198).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could&lt;br/&gt;
 have caused a system crash because the PEBS status in a PEBS record was&lt;br/&gt;
 mishandled (bsc#1184196 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28964: Fixed a race condition in get_old_root which could have&lt;br/&gt;
 allowed attackers to cause a denial of service (bsc#1184193).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan&lt;br/&gt;
 (bsc#1183593 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not&lt;br/&gt;
 prevent user applications from sending kernel RPC messages (bsc#1183596).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28038: Fixed an issue with the netback driver which was lacking&lt;br/&gt;
 necessary treatment of errors such as failed memory allocations&lt;br/&gt;
 (bsc#1183022).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27365: Fixed an issue where an unprivileged user can send a&lt;br/&gt;
 Netlink message that is associated with iSCSI, and has a length up to&lt;br/&gt;
 the maximum length of a Netlink message (bsc#1182715).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27364: Fixed an issue where an attacker could craft Netlink&lt;br/&gt;
 messages (bsc#1182717).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27363: Fixed a kernel pointer leak which could have been used&lt;br/&gt;
 to determine the address of the iscsi_transport structure (bsc#1182716).&lt;/li&gt;
	&lt;li&gt;CVE-2020-35519: Fixed an out-of-bounds memory access was found in&lt;br/&gt;
 x25_bind (bsc#1183696).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27815: Fixed an issue in JFS filesystem where could have&lt;br/&gt;
 allowed an attacker to execute code (bsc#1179454).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds&lt;br/&gt;
 speculation on pointer arithmetic, leading to side-channel attacks that&lt;br/&gt;
 defeat Spectre mitigations and obtain sensitive information from kernel&lt;br/&gt;
 memory (bsc#1183775).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre&lt;br/&gt;
 mitigations and obtain sensitive information from kernel memory&lt;br/&gt;
 (bsc#1183686).&lt;/li&gt;
	&lt;li&gt;CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire&lt;br/&gt;
 function (bsc#1159280 ).&lt;/li&gt;
	&lt;li&gt;CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in&lt;br/&gt;
 aa_audit_rule_init() (bsc#1156256).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).&lt;/li&gt;
	&lt;li&gt;CVE-2021-30002: Fixed a memory leak for large arguments in&lt;br/&gt;
 video_usercopy (bsc#1184120).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29154: Fixed incorrect computation of branch displacements,&lt;br/&gt;
 allowing arbitrary code execution (bsc#1184391).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop&lt;br/&gt;
 continually was finding the same bad inode (bsc#1184194).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509&lt;br/&gt;
 ).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering&lt;br/&gt;
 destruction of a large SEV VM (bsc#1184511).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36310: Fixed infinite loop for certain nested page faults&lt;br/&gt;
 (bsc#1184512).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed&lt;br/&gt;
 multiple bugs in NFC subsytem (bsc#1178181).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem&lt;br/&gt;
 implementation which could have caused a system crash (bsc#1184211).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;The following non-security bugs were fixed:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="64051">LU-14671</key>
            <summary>kernel update [SLES15 SP2 5.3.18-24.61.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Wed, 5 May 2021 18:08:07 +0000</created>
                <updated>Sat, 29 May 2021 06:55:25 +0000</updated>
                            <resolved>Thu, 27 May 2021 19:04:34 +0000</resolved>
                                                    <fixVersion>Lustre 2.15.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="300579" author="gerrit" created="Wed, 5 May 2021 18:13:33 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/43549&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/43549&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14671&quot; title=&quot;kernel update [SLES15 SP2 5.3.18-24.61.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14671&quot;&gt;&lt;del&gt;LU-14671&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP2 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-24.61.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 11b39bebf4c3c35ed338f933ec5c0e14400cfede&lt;/p&gt;</comment>
                            <comment id="302831" author="gerrit" created="Thu, 27 May 2021 18:18:09 +0000"  >&lt;p&gt;Oleg Drokin (green@whamcloud.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/43549/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/43549/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14671&quot; title=&quot;kernel update [SLES15 SP2 5.3.18-24.61.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14671&quot;&gt;&lt;del&gt;LU-14671&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP2 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-24.61.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: a8d030e7dc20aa9076b1574b131bd80bc42030cf&lt;/p&gt;</comment>
                            <comment id="302855" author="pjones" created="Thu, 27 May 2021 19:04:34 +0000"  >&lt;p&gt;Landed for 2.15&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="63371">LU-14529</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="64449">LU-14722</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i01tsv:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>