<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:18:45 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-15489] kernel update [SLES15 SP2 5.3.18-24.99.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-15489</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;
&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2022-0185: Incorrect param length parsing in legacy_parse_param&lt;br/&gt;
     which could have led to a local privilege escalation (bsc#1194517).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk&lt;br/&gt;
     (bsc#1194985).&lt;/li&gt;
	&lt;li&gt;CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c&lt;br/&gt;
     in the TEE subsystem in the Linux kernel that occured because of a race&lt;br/&gt;
     condition in tee_shm_get_from_id during an attempt to free a shared&lt;br/&gt;
     memory object (bnc#1193767).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4197: Fixed a cgroup issue where lower privileged processes&lt;br/&gt;
     could write to fds of lower privileged ones that could lead to privilege&lt;br/&gt;
     escalation (bsc#1194302).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc&lt;br/&gt;
     function (bsc#1193927).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4202: Fixed a race condition during NFC device remove which&lt;br/&gt;
     could lead to a use-after-free memory corruption (bsc#1194529)&lt;/li&gt;
	&lt;li&gt;CVE-2021-4083: A read-after-free memory flaw was found in the Linux&lt;br/&gt;
     kernel&apos;s garbage collection for Unix domain socket file handlers in the&lt;br/&gt;
     way users call close() and fget() simultaneously and can potentially&lt;br/&gt;
     trigger a race condition. This flaw allowed a local user to crash the&lt;br/&gt;
     system or escalate their privileges on the system. (bnc#1193727).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4149: Fixed a locking condition in btrfs which could lead to&lt;br/&gt;
     system deadlocks (bsc#1194001).&lt;/li&gt;
	&lt;li&gt;CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an&lt;br/&gt;
     information leak because of certain use of a hash table which, although&lt;br/&gt;
     big, doesn&apos;t properly consider that IPv6-based attackers can typically&lt;br/&gt;
     choose among many IPv6 source addresses (bnc#1194094).&lt;/li&gt;
	&lt;li&gt;CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an&lt;br/&gt;
     information leak because the hash table is very small (bnc#1194087).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4001: A race condition was found in the Linux kernel&apos;s ebpf&lt;br/&gt;
     verifier between bpf_map_update_elem and bpf_map_freeze due to a missing&lt;br/&gt;
     lock in kernel/bpf/syscall.c. In this flaw, a local user with a special&lt;br/&gt;
     privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped&lt;br/&gt;
     address space. (bnc#1192990).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28715: Guest can force Linux netback driver to hog large&lt;br/&gt;
     amounts of kernel memory. Incoming data packets for a guest in the Linux&lt;br/&gt;
     kernel&apos;s netback driver are buffered until the guest is ready to process&lt;br/&gt;
     them. There are some measures taken for avoiding to pile up too much&lt;br/&gt;
     data, but those can be bypassed by the guest: There was a timeout how&lt;br/&gt;
     long the client side of an interface can stop consuming new packets&lt;br/&gt;
     before it is assumed to have stalled, but this timeout is rather long&lt;br/&gt;
     (60 seconds by default). Using a UDP connection on a fast interface can&lt;br/&gt;
     easily accumulate gigabytes of data in that time. (CVE-2021-28715) The&lt;br/&gt;
     timeout could even never trigger if the guest manages to have only one&lt;br/&gt;
     free slot in its RX queue ring page and the next package would require&lt;br/&gt;
     more than one free slot, which may be the case when using GSO, XDP, or&lt;br/&gt;
     software hashing. ()&lt;/li&gt;
	&lt;li&gt;CVE-2021-28714: Guest can force Linux netback driver to hog large&lt;br/&gt;
     amounts of kernel memory. Incoming data packets for a guest in the Linux&lt;br/&gt;
     kernel&apos;s netback driver are buffered until the guest is ready to process&lt;br/&gt;
     them. There are some measures taken for avoiding to pile up too much&lt;br/&gt;
     data, but those can be bypassed by the guest: There was a timeout how&lt;br/&gt;
     long the client side of an interface can stop consuming new packets&lt;br/&gt;
     before it is assumed to have stalled, but this timeout is rather long&lt;br/&gt;
     (60 seconds by default). Using a UDP connection on a fast interface can&lt;br/&gt;
     easily accumulate gigabytes of data in that time. (CVE-2021-28715) The&lt;br/&gt;
     timeout could even never trigger if the guest manages to have only one&lt;br/&gt;
     free slot in its RX queue ring page and the next package would require&lt;br/&gt;
     more than one free slot, which may be the case when using GSO, XDP, or&lt;br/&gt;
     software hashing (bnc#1193442).&lt;/li&gt;
	&lt;li&gt;CVE-2021-28713: Rogue backends can cause DoS of guests via high&lt;br/&gt;
     frequency events. Xen offers the ability to run PV backends in regular&lt;br/&gt;
     unprivileged guests, typically referred to as &quot;driver domains&quot;. Running&lt;br/&gt;
     PV backends in driver domains has one primary security advantage: if a&lt;br/&gt;
     driver domain gets compromised, it doesn&apos;t have the privileges to take&lt;br/&gt;
     over the system. However, a malicious driver domain could try to attack&lt;br/&gt;
     other guests via sending events at a high frequency leading to a Denial&lt;br/&gt;
     of Service in the guest due to trying to service interrupts for&lt;br/&gt;
     elongated amounts of time. (bsc#1193440)&lt;/li&gt;
	&lt;li&gt;CVE-2021-28712: Rogue backends can cause DoS of guests via high&lt;br/&gt;
     frequency events. Xen offers the ability to run PV backends in regular&lt;br/&gt;
     unprivileged guests, typically referred to as &quot;driver domains&quot;. Running&lt;br/&gt;
     PV backends in driver domains has one primary security advantage: if a&lt;br/&gt;
     driver domain gets compromised, it doesn&apos;t have the privileges to take&lt;br/&gt;
     over the system. However, a malicious driver domain could try to attack&lt;br/&gt;
     other guests via sending events at a high frequency leading to a Denial&lt;br/&gt;
     of Service in the guest due to trying to service interrupts for&lt;br/&gt;
     elongated amounts of time. (bsc#1193440)&lt;/li&gt;
	&lt;li&gt;CVE-2021-28711: Rogue backends can cause DoS of guests via high&lt;br/&gt;
     frequency events. Xen offers the ability to run PV backends in regular&lt;br/&gt;
     unprivileged guests, typically referred to as &quot;driver domains&quot;. Running&lt;br/&gt;
     PV backends in driver domains has one primary security advantage: if a&lt;br/&gt;
     driver domain gets compromised, it doesn&apos;t have the privileges to take&lt;br/&gt;
     over the system. However, a malicious driver domain could try to attack&lt;br/&gt;
     other guests via sending events at a high frequency leading to a Denial&lt;br/&gt;
     of Service in the guest due to trying to service interrupts for&lt;br/&gt;
     elongated amounts of time (bnc#1193440).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27825: A use-after-free flaw was found in&lt;br/&gt;
     kernel/trace/ring_buffer.c. There was a race problem in trace_open and&lt;br/&gt;
     resize of cpu buffer running parallely on different cpus, may cause a&lt;br/&gt;
     denial of service problem (DOS). This flaw could even allow a local&lt;br/&gt;
     attacker with special user privilege to a kernel information leak threat&lt;br/&gt;
     (bnc#1179960).&lt;/li&gt;
	&lt;li&gt;CVE-2021-43975: hw_atl_utils_fw_rpc_wait in&lt;br/&gt;
     drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an&lt;br/&gt;
     attacker (who can introduce a crafted device) to trigger an&lt;br/&gt;
     out-of-bounds write via a crafted length value (bnc#1192845).&lt;/li&gt;
	&lt;li&gt;CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe&lt;br/&gt;
     driver for Linux before version 3.17.3 may have allowed an authenticated&lt;br/&gt;
     user to potentially enable denial of service via local access&lt;br/&gt;
     (bnc#1192877).&lt;/li&gt;
	&lt;li&gt;CVE-2021-43976: mwifiex_usb_recv in&lt;br/&gt;
     drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can&lt;br/&gt;
     connect a crafted USB device) to cause a denial of service&lt;br/&gt;
     (skb_over_panic) (bnc#1192847).&lt;/li&gt;
	&lt;li&gt;CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead&lt;br/&gt;
     to exposing hugepages to other users (bsc#1192946).&lt;/li&gt;
	&lt;li&gt;CVE-2020-27820: A use-after-frees in nouveau&apos;s postclose() handler could&lt;br/&gt;
     happen if removing device (that is not common to remove video card&lt;br/&gt;
     physically without power-off, but same happens if &quot;unbind&quot; the driver)&lt;br/&gt;
     (bnc#1179599).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="68284">LU-15489</key>
            <summary>kernel update [SLES15 SP2 5.3.18-24.99.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="6" iconUrl="https://jira.whamcloud.com/images/icons/statuses/closed.png" description="The issue is considered finished, the resolution is correct. Issues which are closed can be reopened.">Closed</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Thu, 27 Jan 2022 20:15:48 +0000</created>
                <updated>Fri, 18 Feb 2022 19:30:23 +0000</updated>
                            <resolved>Fri, 18 Feb 2022 19:30:23 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="324182" author="gerrit" created="Thu, 27 Jan 2022 20:21:39 +0000"  >&lt;p&gt;&quot;Jian Yu &amp;lt;yujian@whamcloud.com&amp;gt;&quot; uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/46346&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/46346&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15489&quot; title=&quot;kernel update [SLES15 SP2 5.3.18-24.99.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15489&quot;&gt;&lt;del&gt;LU-15489&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP2 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-24.99.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: cf34fff95922f72706d80cd1ce40924261d8cdf6&lt;/p&gt;</comment>
                            <comment id="326747" author="yujian" created="Fri, 18 Feb 2022 19:30:23 +0000"  >&lt;p&gt;A new version is available in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15568&quot; title=&quot;kernel update [SLES15 SP2 5.3.18-24.102.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15568&quot;&gt;&lt;del&gt;LU-15568&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="67479">LU-15331</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="68757">LU-15568</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i02gj3:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>