<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 01:17:17 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-1511] Kernel update [RHEL5.8 2.6.18-308.11.1.el5]</title>
                <link>https://jira.whamcloud.com/browse/LU-1511</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;This update fixes the following security issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It was found that the Xen hypervisor implementation as shipped with Red&lt;br/&gt;
Hat Enterprise Linux 5 did not properly restrict the syscall return&lt;br/&gt;
addresses in the sysret return path to canonical addresses. An unprivileged&lt;br/&gt;
user in a 64-bit para-virtualized guest, that is running on a 64-bit host&lt;br/&gt;
that has an Intel CPU, could use this flaw to crash the host or,&lt;br/&gt;
potentially, escalate their privileges, allowing them to execute arbitrary&lt;br/&gt;
code at the hypervisor level. (CVE-2012-0217, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that guests could trigger a bug in earlier AMD CPUs, leading&lt;br/&gt;
to a CPU hard lockup, when running on the Xen hypervisor implementation. An&lt;br/&gt;
unprivileged user in a 64-bit para-virtualized guest could use this flaw to&lt;br/&gt;
crash the host. Warning: After installing this update, hosts that are using&lt;br/&gt;
an affected AMD CPU (refer to Red Hat Bugzilla bug #824966 for a list) will&lt;br/&gt;
fail to boot. In order to boot such hosts, the new kernel parameter,&lt;br/&gt;
allow_unsafe, can be used (&quot;allow_unsafe=on&quot;). This option should only be&lt;br/&gt;
used with hosts that are running trusted guests, as setting it to &quot;on&quot;&lt;br/&gt;
reintroduces the flaw (allowing guests to crash the host). (CVE-2012-2934,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Note: For Red Hat Enterprise Linux guests, only privileged guest users can&lt;br/&gt;
exploit the CVE-2012-0217 and CVE-2012-2934 issues.&lt;/p&gt;

&lt;p&gt;Bugs fixed (&lt;a href=&quot;http://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;813428 - CVE-2012-0217 kernel: x86-64: avoid sysret to non-canonical address&lt;br/&gt;
824966 - CVE-2012-2934 kernel: denial of service due to AMD Erratum #121&lt;/p&gt;
</description>
                <environment></environment>
        <key id="14865">LU-1511</key>
            <summary>Kernel update [RHEL5.8 2.6.18-308.11.1.el5]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="ys">Yang Sheng</assignee>
                                    <reporter username="ys">Yang Sheng</reporter>
                        <labels>
                    </labels>
                <created>Tue, 12 Jun 2012 11:43:38 +0000</created>
                <updated>Fri, 22 Feb 2013 11:16:59 +0000</updated>
                            <resolved>Tue, 28 Aug 2012 13:17:16 +0000</resolved>
                                                    <fixVersion>Lustre 2.1.3</fixVersion>
                    <fixVersion>Lustre 1.8.9</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="43696" author="ys" created="Thu, 23 Aug 2012 11:48:31 +0000"  >&lt;p&gt;This update fixes the following security issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s dl2k driver, used by&lt;br/&gt;
certain D-Link Gigabit Ethernet adapters, restricted IOCTLs. A local,&lt;br/&gt;
unprivileged user could use this flaw to issue potentially harmful IOCTLs,&lt;br/&gt;
which could cause Ethernet adapters using the dl2k driver to malfunction&lt;br/&gt;
(for example, losing network connectivity). (CVE-2012-2313, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;http://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;818820 - CVE-2012-2313 kernel: unfiltered netdev rio_ioctl access by users&lt;/p&gt;</comment>
                            <comment id="43889" author="pjones" created="Tue, 28 Aug 2012 13:17:16 +0000"  >&lt;p&gt;This update landed for 2.1.3. Please create a new ticket to track any more current RHEL5.8 updates - thanks&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzva1b:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>5160</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>