<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:21:09 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-15771] kernel update [SLES15 SP2 5.3.18-150200.24.112.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-15771</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 15 SP2 kernel was updated.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c&lt;br/&gt;
     which could lead to an use-after-free if there is a corrupted quota&lt;br/&gt;
     file. (bnc#1197366)&lt;/li&gt;
	&lt;li&gt;CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP&lt;br/&gt;
     transformation code. This flaw allowed a local attacker with a normal&lt;br/&gt;
     user privilege to overwrite kernel heap objects and may cause a local&lt;br/&gt;
     privilege escalation. (bnc#1197462)&lt;/li&gt;
	&lt;li&gt;CVE-2022-0850: Fixed a kernel information leak vulnerability in&lt;br/&gt;
     iov_iter.c. (bsc#1196761)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow&lt;br/&gt;
     a local attacker to gain privilege escalation. (bnc#1197702)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to&lt;br/&gt;
     use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock.&lt;br/&gt;
     (bsc#1197331)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198031)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198032)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198033)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the&lt;br/&gt;
     netfilter subsystem. This vulnerability gives an attacker a powerful&lt;br/&gt;
     primitive that can be used to both read from and write to relative stack&lt;br/&gt;
     data, which can lead to arbitrary code execution. (bsc#1197227)&lt;/li&gt;
	&lt;li&gt;CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels&lt;br/&gt;
     DMA subsystem. This flaw allowed a local user to read random memory from&lt;br/&gt;
     the kernel space. (bnc#1196823)&lt;/li&gt;
	&lt;li&gt;CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which&lt;br/&gt;
     allowed attackers to obtain sensitive information from the memory via&lt;br/&gt;
     crafted frame lengths from a USB device. (bsc#1196836)&lt;/li&gt;
	&lt;li&gt;CVE-2021-39698: Fixed a possible memory corruption due to a use after&lt;br/&gt;
     free in aio_poll_complete_work. This could lead to local escalation of&lt;br/&gt;
     privilege with no additional execution privileges needed. (bsc#1196956)&lt;/li&gt;
	&lt;li&gt;CVE-2021-0920: Fixed a race condition during UNIX socket garbage&lt;br/&gt;
     collection that could lead to local privilege escalation. (bsc#119373)&lt;br/&gt;
   -&lt;br/&gt;
   CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,&lt;br/&gt;
     CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have&lt;br/&gt;
     lead to read/write access to memory pages or denial of service. These&lt;br/&gt;
     issues are related to the Xen PV device frontend drivers. (bsc#1196488)&lt;/li&gt;
	&lt;li&gt;CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An&lt;br/&gt;
     attacker with adjacent NFC access could crash the system or corrupt the&lt;br/&gt;
     system memory. (bsc#1196830)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="69853">LU-15771</key>
            <summary>kernel update [SLES15 SP2 5.3.18-150200.24.112.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Thu, 21 Apr 2022 18:17:48 +0000</created>
                <updated>Tue, 25 Apr 2023 20:53:18 +0000</updated>
                            <resolved>Tue, 25 Apr 2023 20:53:18 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>1</watches>
                                                                                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="69221">LU-15677</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i02nov:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>