<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:20:22 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-15677] kernel update [SLES15 SP2 5.3.18-24.107.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-15677</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2022-0001: Fixed Branch History Injection vulnerability&lt;br/&gt;
     (bsc#1191580).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability&lt;br/&gt;
     (bsc#1191580).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0847: Fixed a vulnerability were a local attackers could&lt;br/&gt;
     overwrite data in arbitrary (read-only) files (bsc#1196584).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0617: Fixed a null pointer dereference in UDF file system&lt;br/&gt;
     functionality. A local user could crash the system by triggering&lt;br/&gt;
     udf_file_write_iter() via a malicious UDF image. (bsc#1196079)&lt;/li&gt;
	&lt;li&gt;CVE-2022-0644: Fixed a denial of service by a local user. A assertion&lt;br/&gt;
     failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).&lt;/li&gt;
	&lt;li&gt;CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were&lt;br/&gt;
     not considered, which lead to a move_data_page NULL pointer dereference&lt;br/&gt;
     (bsc#1195987).&lt;/li&gt;
	&lt;li&gt;CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in&lt;br/&gt;
     drivers/net/hamradio/yam.c (bsc#1195897).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0487: A use-after-free vulnerability was found in&lt;br/&gt;
     rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c&lt;br/&gt;
     (bsc#1194516).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0492: Fixed a privilege escalation related to cgroups v1&lt;br/&gt;
     release_agent feature, which allowed bypassing namespace isolation&lt;br/&gt;
     unexpectedly (bsc#1195543).&lt;/li&gt;
	&lt;li&gt;CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets&lt;br/&gt;
     the O_DIRECTORY flag, and tries to open a regular file,&lt;br/&gt;
     nfs_atomic_open() performs a regular lookup. If a regular file is found,&lt;br/&gt;
     ENOTDIR should have occured, but the server instead returned&lt;br/&gt;
     uninitialized data in the file descriptor (bsc#1195612).&lt;/li&gt;
	&lt;li&gt;CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the&lt;br/&gt;
     RNDIS_MSG_SET command. Attackers can obtain sensitive information from&lt;br/&gt;
     kernel memory (bsc#1196235).&lt;/li&gt;
	&lt;li&gt;CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390&lt;br/&gt;
     allows kernel memory read/write (bsc#1195516).&lt;/li&gt;
	&lt;li&gt;CVE-2022-25258: The USB Gadget subsystem lacked certain validation of&lt;br/&gt;
     interface OS descriptor requests, which could have lead to memory&lt;br/&gt;
     corruption (bsc#1196096).&lt;/li&gt;
	&lt;li&gt;CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&amp;gt;buf&lt;br/&gt;
     release (bsc#1195905).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="69221">LU-15677</key>
            <summary>kernel update [SLES15 SP2 5.3.18-24.107.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Wed, 23 Mar 2022 05:49:22 +0000</created>
                <updated>Fri, 17 Jun 2022 23:54:40 +0000</updated>
                            <resolved>Fri, 17 Jun 2022 23:54:40 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="329925" author="gerrit" created="Wed, 23 Mar 2022 05:55:11 +0000"  >&lt;p&gt;&quot;Jian Yu &amp;lt;yujian@whamcloud.com&amp;gt;&quot; uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/46897&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/46897&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15677&quot; title=&quot;kernel update [SLES15 SP2 5.3.18-24.107.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15677&quot;&gt;&lt;del&gt;LU-15677&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP2 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-24.107.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 2d415fa43fb50475cbff7bbf3f05de85013baa3f&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="68757">LU-15568</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="69853">LU-15771</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i02lgv:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>