<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:12:45 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-14782] support for SLES 15 SP3</title>
                <link>https://jira.whamcloud.com/browse/LU-14782</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   &lt;a href=&quot;https://www.suse.com/releasenotes/x86_64/SUSE-SLES/15-SP3/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://www.suse.com/releasenotes/x86_64/SUSE-SLES/15-SP3/&lt;/a&gt;&lt;br/&gt;
   Kernel version is 5.3.18-59.5.2.&lt;/p&gt;

&lt;p&gt;   The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic&lt;br/&gt;
     operations by the BPF verifier could be abused to perform out-of-bounds&lt;br/&gt;
     reads and writes in kernel memory (bsc#1186484).&lt;/li&gt;
	&lt;li&gt;CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This&lt;br/&gt;
     could lead to writing an arbitrary values. (bsc#1186111)&lt;/li&gt;
	&lt;li&gt;CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP)&lt;br/&gt;
     forwards EAPOL frames to other clients even though the sender has not&lt;br/&gt;
     yet successfully authenticated to the AP. (bnc#1186062)&lt;/li&gt;
	&lt;li&gt;CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed&lt;br/&gt;
     local attackers to elevate their privileges. (bnc#1186060)&lt;/li&gt;
	&lt;li&gt;CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This&lt;br/&gt;
     vulnerability is related to the PROVIDE_BUFFERS operation, which allowed&lt;br/&gt;
     the MAX_RW_COUNT limit to be bypassed (bsc#1185642).&lt;/li&gt;
	&lt;li&gt;CVE-2021-32399: Fixed a race condition when removing the HCI controller&lt;br/&gt;
     (bnc#1184611).&lt;/li&gt;
	&lt;li&gt;CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected&lt;br/&gt;
     Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&apos;t&lt;br/&gt;
     require that received fragments be cleared from memory after&lt;br/&gt;
     (re)connecting to a network. Under the right circumstances this can be&lt;br/&gt;
     abused to inject arbitrary network packets and/or exfiltrate user data&lt;br/&gt;
     (bnc#1185859).&lt;/li&gt;
	&lt;li&gt;CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected&lt;br/&gt;
     Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&apos;t&lt;br/&gt;
     require that all fragments of a frame are encrypted under the same key.&lt;br/&gt;
     An adversary can abuse this to decrypt selected fragments when another&lt;br/&gt;
     device sends fragmented frames and the WEP, CCMP, or GCMP encryption key&lt;br/&gt;
     is periodically renewed (bnc#1185859 bnc#1185862).&lt;/li&gt;
	&lt;li&gt;CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected&lt;br/&gt;
     Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn&apos;t&lt;br/&gt;
     require that the A-MSDU flag in the plaintext QoS header field is&lt;br/&gt;
     authenticated. Against devices that support receiving non-SSP A-MSDU&lt;br/&gt;
     frames (which is mandatory as part of 802.11n), an adversary can abuse&lt;br/&gt;
     this to inject arbitrary network packets. (bnc#1185861)&lt;/li&gt;
	&lt;li&gt;CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble&lt;br/&gt;
     fragments, even though some of them were sent in plaintext. This&lt;br/&gt;
     vulnerability can be abused to inject packets and/or exfiltrate selected&lt;br/&gt;
     fragments when another device sends fragmented frames and the WEP, CCMP,&lt;br/&gt;
     or GCMP data-confidentiality protocol is used (bnc#1185859).&lt;/li&gt;
	&lt;li&gt;CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305&lt;br/&gt;
     4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept&lt;br/&gt;
     second (or subsequent) broadcast fragments even when sent in plaintext&lt;br/&gt;
     and process them as full unfragmented frames. An adversary can abuse&lt;br/&gt;
     this to inject arbitrary network packets independent of the network&lt;br/&gt;
     configuration. (bnc#1185860)&lt;/li&gt;
	&lt;li&gt;CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H,&lt;br/&gt;
     where the Message Integrity Check (authenticity) of fragmented TKIP&lt;br/&gt;
     frames was not verified. An adversary can abuse this to inject and&lt;br/&gt;
     possibly decrypt packets in WPA or WPA2 networks that support the TKIP&lt;br/&gt;
     data-confidentiality protocol. (bnc#1185987)&lt;/li&gt;
	&lt;li&gt;CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed&lt;br/&gt;
     attackers to cause a denial of service (panic) because&lt;br/&gt;
     net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a&lt;br/&gt;
     full memory barrier upon the assignment of a new table value&lt;br/&gt;
     (bnc#1184208).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29155: Fixed an issue that was discovered in&lt;br/&gt;
     kernel/bpf/verifier.c that performs undesirable out-of-bounds&lt;br/&gt;
     speculation on pointer arithmetic, leading to side-channel attacks that&lt;br/&gt;
     defeat Spectre mitigations and obtain sensitive information from kernel&lt;br/&gt;
     memory. Specifically, for sequences of pointer arithmetic operations,&lt;br/&gt;
     the pointer modification performed by the first operation was not&lt;br/&gt;
     correctly accounted for when restricting subsequent operations&lt;br/&gt;
     (bnc#1184942).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3444: Fixed an issue with the bpf verifier which did not&lt;br/&gt;
     properly handle mod32 destination register truncation when the source&lt;br/&gt;
     register was known to be 0 leading to out of bounds read  (bsc#1184170).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent&lt;br/&gt;
     (bsc#1173485).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed&lt;br/&gt;
     attackers to obtain sensitive information from kernel memory because of&lt;br/&gt;
     a partially uninitialized data structure (bsc#1184192 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have&lt;br/&gt;
     allowed attackers to cause a denial of service due to race conditions&lt;br/&gt;
     during an update of the local and shared status (bsc#1184167).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver&lt;br/&gt;
     which could have allowed attackers to cause a system crash due to a&lt;br/&gt;
     calculation of negative fragment size (bsc#1184168).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a&lt;br/&gt;
     new device name to the driver from userspace, allowing userspace to&lt;br/&gt;
     write data to the kernel stack frame directly (bsc#1184198).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could&lt;br/&gt;
     have caused a system crash because the PEBS status in a PEBS record was&lt;br/&gt;
     mishandled (bsc#1184196 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28964: Fixed a race condition in get_old_root which could have&lt;br/&gt;
     allowed attackers to cause a denial of service (bsc#1184193).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan&lt;br/&gt;
     (bsc#1183593 ).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not&lt;br/&gt;
     prevent user applications from sending kernel RPC messages (bsc#1183596).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28038: Fixed an issue with the netback driver which was lacking&lt;br/&gt;
     necessary treatment of errors such as failed memory allocations&lt;br/&gt;
     (bsc#1183022).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27365: Fixed an issue where an unprivileged user can send a&lt;br/&gt;
     Netlink message that is associated with iSCSI, and has a length up to&lt;br/&gt;
     the maximum length of a Netlink message (bsc#1182715).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27364: Fixed an issue where an attacker could craft Netlink&lt;br/&gt;
     messages (bsc#1182717).&lt;/li&gt;
	&lt;li&gt;CVE-2021-27363: Fixed a kernel pointer leak which could have been used&lt;br/&gt;
     to determine the address of the iscsi_transport structure (bsc#1182716).&lt;/li&gt;
	&lt;li&gt;CVE-2020-35519: Fixed an out-of-bounds memory access  was found in&lt;br/&gt;
     x25_bind (bsc#1183696).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27815: Fixed an issue in JFS filesystem  where could have&lt;br/&gt;
     allowed an attacker to execute code (bsc#1179454).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds&lt;br/&gt;
     speculation on pointer arithmetic, leading to side-channel attacks that&lt;br/&gt;
     defeat Spectre mitigations and obtain sensitive information from kernel&lt;br/&gt;
     memory (bsc#1183775).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre&lt;br/&gt;
     mitigations and obtain sensitive information from kernel memory&lt;br/&gt;
     (bsc#1183686).&lt;/li&gt;
	&lt;li&gt;CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire&lt;br/&gt;
     function (bsc#1159280 ).&lt;/li&gt;
	&lt;li&gt;CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in&lt;br/&gt;
     aa_audit_rule_init() (bsc#1156256).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).&lt;/li&gt;
	&lt;li&gt;CVE-2021-30002: Fixed a memory leak for large arguments in&lt;br/&gt;
     video_usercopy (bsc#1184120).&lt;/li&gt;
	&lt;li&gt;CVE-2021-29154: Fixed incorrect computation of branch displacements,&lt;br/&gt;
     allowing arbitrary code execution (bsc#1184391).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop&lt;br/&gt;
     continually was finding the same bad inode (bsc#1184194).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28952: Fixed a buffer overflow in the soundwire device driver,&lt;br/&gt;
     triggered when an unexpected port ID number is encountered.&lt;br/&gt;
     (bnc#1184197).&lt;/li&gt;
	&lt;li&gt;CVE-2021-20268: Fixed an out-of-bounds access flaw in the implementation&lt;br/&gt;
     of the eBPF code verifier. This flaw allowed a local user to crash the&lt;br/&gt;
     system or possibly escalate their privileges. (bnc#1183077)&lt;/li&gt;
	&lt;li&gt;CVE-2020-27673: Fixed a vulnerability with xen, where guest OS users&lt;br/&gt;
     could cause a denial of service (host OS hang) via a high rate of events&lt;br/&gt;
     to dom0 (bnc#1177411).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509&lt;br/&gt;
     ).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering&lt;br/&gt;
     destruction of a large SEV VM (bsc#1184511).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36310: Fixed infinite loop for certain nested page faults&lt;br/&gt;
     (bsc#1184512).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3489: Fixed an issue where the eBPF RINGBUF bpf_ringbuf_reserve&lt;br/&gt;
     did not check that the allocated size was smaller than the ringbuf size&lt;br/&gt;
     (bnc#1185640).&lt;/li&gt;
	&lt;li&gt;CVE-2021-3490: Fixed an issue where the eBPF ALU32 bounds tracking for&lt;br/&gt;
     bitwise ops (AND, OR and XOR) did not update the 32-bit bounds&lt;br/&gt;
     (bnc#1185641 bnc#1185796 ).&lt;/li&gt;
	&lt;li&gt;CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem&lt;br/&gt;
     implementation which could have caused a system crash (bsc#1184211).&lt;/li&gt;
	&lt;li&gt;CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed&lt;br/&gt;
     multiple bugs in NFC subsytem (bsc#1178181).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="64834">LU-14782</key>
            <summary>support for SLES 15 SP3</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Wed, 23 Jun 2021 17:10:41 +0000</created>
                <updated>Thu, 5 May 2022 14:14:22 +0000</updated>
                            <resolved>Mon, 27 Sep 2021 18:10:20 +0000</resolved>
                                                    <fixVersion>Lustre 2.15.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>3</watches>
                                                                            <comments>
                            <comment id="305316" author="gerrit" created="Wed, 23 Jun 2021 17:30:25 +0000"  >&lt;p&gt;Jian Yu (yujian@whamcloud.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/44062&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/44062&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14782&quot; title=&quot;support for SLES 15 SP3&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14782&quot;&gt;&lt;del&gt;LU-14782&lt;/del&gt;&lt;/a&gt; kernel: new kernel &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES15 SP3 5.3.18-59.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 3073ec05bb8f299c9e6dd10aab1e445d28e7a117&lt;/p&gt;</comment>
                            <comment id="306534" author="yujian" created="Wed, 7 Jul 2021 23:18:33 +0000"  >&lt;p&gt;New version is available: kernel-default-5.3.18-59.10.1&lt;br/&gt;
&lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2021-June/009097.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2021-June/009097.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&#160;&lt;/p&gt;</comment>
                            <comment id="307915" author="yujian" created="Wed, 21 Jul 2021 00:26:38 +0000"  >&lt;p&gt;New version is available: kernel-default-5.3.18-59.16.1&lt;br/&gt;
&lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="312136" author="yujian" created="Mon, 6 Sep 2021 02:15:51 +0000"  >&lt;p&gt;New version is available: kernel-default-5.3.18-59.19.1&lt;br/&gt;
&lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="313186" author="gerrit" created="Fri, 17 Sep 2021 14:10:26 +0000"  >&lt;p&gt;&quot;Oleg Drokin &amp;lt;green@whamcloud.com&amp;gt;&quot; merged in patch &lt;a href=&quot;https://review.whamcloud.com/44062/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/44062/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-14782&quot; title=&quot;support for SLES 15 SP3&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-14782&quot;&gt;&lt;del&gt;LU-14782&lt;/del&gt;&lt;/a&gt; kernel: new kernel &lt;span class=&quot;error&quot;&gt;&amp;#91;SLES15 SP3 5.3.18-59.19.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 0a900c5b4a28c4c63055dde00c7b91e39c4912a0&lt;/p&gt;</comment>
                            <comment id="314051" author="yujian" created="Mon, 27 Sep 2021 18:10:20 +0000"  >&lt;p&gt;Patch landed on master branch for Lustre 2.15.0.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="66263">LU-15036</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i01xkv:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>