<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 01:17:30 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-1536] Kernel update [RHEL6.2 2.6.32-220.23.1.el6]</title>
                <link>https://jira.whamcloud.com/browse/LU-1536</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;This update fixes the following security issues:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A local, unprivileged user could use an integer overflow flaw in&lt;br/&gt;
drm_mode_dirtyfb_ioctl() to cause a denial of service or escalate their&lt;br/&gt;
privileges. (CVE-2012-0044, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A buffer overflow flaw was found in the macvtap device driver, used for&lt;br/&gt;
creating a bridged network between the guest and the host in KVM&lt;br/&gt;
(Kernel-based Virtual Machine) environments. A privileged guest user in a&lt;br/&gt;
KVM guest could use this flaw to crash the host. Note: This issue only&lt;br/&gt;
affected hosts that have the vhost_net module loaded with the&lt;br/&gt;
experimental_zcopytx module option enabled (it is not enabled by default),&lt;br/&gt;
and that also have macvtap configured for at least one guest.&lt;br/&gt;
(CVE-2012-2119, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;When a set user ID (setuid) application is executed, certain personality&lt;br/&gt;
flags for controlling the application&apos;s behavior are cleared (that is, a&lt;br/&gt;
privileged application will not be affected by those flags). It was found&lt;br/&gt;
that those flags were not cleared if the application was made privileged&lt;br/&gt;
via file system capabilities. A local, unprivileged user could use this&lt;br/&gt;
flaw to change the behavior of such applications, allowing them to bypass&lt;br/&gt;
intended restrictions. Note that for default installations, no application&lt;br/&gt;
shipped by Red Hat for Red Hat Enterprise Linux is made privileged via file&lt;br/&gt;
system capabilities. (CVE-2012-2123, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the data_len parameter of the sock_alloc_send_pskb()&lt;br/&gt;
function in the Linux kernel&apos;s networking implementation was not validated&lt;br/&gt;
before use. A privileged guest user in a KVM guest could use this flaw to&lt;br/&gt;
crash the host or, possibly, escalate their privileges on the host.&lt;br/&gt;
(CVE-2012-2136, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A buffer overflow flaw was found in the setup_routing_entry() function in&lt;br/&gt;
the KVM subsystem of the Linux kernel in the way the Message Signaled&lt;br/&gt;
Interrupts (MSI) routing entry was handled. A local, unprivileged user&lt;br/&gt;
could use this flaw to cause a denial of service or, possibly, escalate&lt;br/&gt;
their privileges. (CVE-2012-2137, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A race condition was found in the Linux kernel&apos;s memory management&lt;br/&gt;
subsystem in the way pmd_none_or_clear_bad(), when called with mmap_sem in&lt;br/&gt;
read mode, and Transparent Huge Pages (THP) page faults interacted. A&lt;br/&gt;
privileged user in a KVM guest with the ballooning functionality enabled&lt;br/&gt;
could potentially use this flaw to crash the host. A local, unprivileged&lt;br/&gt;
user could use this flaw to crash the system. (CVE-2012-1179, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way device memory was handled during guest device&lt;br/&gt;
removal. Upon successful device removal, memory used by the device was not&lt;br/&gt;
properly unmapped from the corresponding IOMMU or properly released from&lt;br/&gt;
the kernel, leading to a memory leak. A malicious user on a KVM host who&lt;br/&gt;
has the ability to assign a device to a guest could use this flaw to crash&lt;br/&gt;
the host. (CVE-2012-2121, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the Linux kernel&apos;s Reliable Datagram Sockets (RDS)&lt;br/&gt;
protocol implementation. A local, unprivileged user could use this flaw to&lt;br/&gt;
cause a denial of service. (CVE-2012-2372, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A race condition was found in the Linux kernel&apos;s memory management&lt;br/&gt;
subsystem in the way pmd_populate() and pte_offset_map_lock() interacted on&lt;br/&gt;
32-bit x86 systems with more than 4GB of RAM. A local, unprivileged user&lt;br/&gt;
could use this flaw to cause a denial of service. (CVE-2012-2373, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;http://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;772894 - CVE-2012-0044 kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()&lt;br/&gt;
803793 - CVE-2012-1179 kernel: thp:__split_huge_page() mapcount != page_mapcount BUG_ON()&lt;br/&gt;
806722 - CVE-2012-2123 kernel: fcaps: clear the same personality flags as suid when fcaps are used&lt;br/&gt;
814149 - CVE-2012-2121 kvm: device assignment page leak&lt;br/&gt;
814278 - CVE-2012-2119 kernel: macvtap: zerocopy: vector length is not validated before pinning user pages&lt;br/&gt;
814657 - kernel crash at ieee80211_mgd_probe_ap_send &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-6.2.z&amp;#93;&lt;/span&gt;&lt;br/&gt;
816151 - CVE-2012-2137 kernel: kvm: buffer overflow in kvm_set_irq()&lt;br/&gt;
816226 - add option to disable 5GHz band to iwlwifi &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-6.2.z&amp;#93;&lt;/span&gt;&lt;br/&gt;
816289 - CVE-2012-2136 kernel: net: insufficient data_len validation in sock_alloc_send_pskb()&lt;br/&gt;
818504 - Disable LRO for all NICs that have LRO enabled &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-6.2.z&amp;#93;&lt;/span&gt;&lt;br/&gt;
818505 - xen: fix drive naming &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-6.2.z&amp;#93;&lt;/span&gt;&lt;br/&gt;
819614 - 2.6.32-220 kernel does not work on a HP DL385G6 with HP Smart Array P410 controller and hpsa driver &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-6.2.z&amp;#93;&lt;/span&gt;&lt;br/&gt;
822754 - CVE-2012-2372 kernel: rds-ping cause kernel panic&lt;br/&gt;
822821 - CVE-2012-2373 kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race condition&lt;/p&gt;</description>
                <environment></environment>
        <key id="14956">LU-1536</key>
            <summary>Kernel update [RHEL6.2 2.6.32-220.23.1.el6]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="2" iconUrl="https://jira.whamcloud.com/images/icons/priorities/critical.svg">Critical</priority>
                        <status id="6" iconUrl="https://jira.whamcloud.com/images/icons/statuses/closed.png" description="The issue is considered finished, the resolution is correct. Issues which are closed can be reopened.">Closed</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="ys">Yang Sheng</assignee>
                                    <reporter username="ys">Yang Sheng</reporter>
                        <labels>
                    </labels>
                <created>Mon, 18 Jun 2012 11:11:51 +0000</created>
                <updated>Wed, 20 Jun 2012 13:01:15 +0000</updated>
                            <resolved>Wed, 20 Jun 2012 13:01:15 +0000</resolved>
                                    <version>Lustre 2.2.0</version>
                    <version>Lustre 2.3.0</version>
                    <version>Lustre 2.1.3</version>
                                                        <due></due>
                            <votes>0</votes>
                                    <watches>0</watches>
                                                                            <comments>
                            <comment id="40937" author="ys" created="Wed, 20 Jun 2012 13:01:15 +0000"  >&lt;p&gt;Move focus on lu-1477.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                                <inwardlinks description="is related to">
                                                        </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzvydj:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9753</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>