<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:21:10 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-15772] kernel update [SLES15 SP3 5.3.18-150300.59.63.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-15772</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 15 SP3 kernel was updated.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels&lt;br/&gt;
     DMA subsystem. This flaw allowed a local user to read random memory from&lt;br/&gt;
     the kernel space. (bnc#1196823)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the&lt;br/&gt;
     netfilter subsystem. This vulnerability gives an attacker a powerful&lt;br/&gt;
     primitive that can be used to both read from and write to relative stack&lt;br/&gt;
     data, which can lead to arbitrary code execution. (bsc#1197227)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198031)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198032)&lt;/li&gt;
	&lt;li&gt;CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c&lt;br/&gt;
     vulnerability in the Linux kernel. (bnc#1198033)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow&lt;br/&gt;
     a local attacker to gain privilege escalation. (bnc#1197702)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to&lt;br/&gt;
     use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock.&lt;br/&gt;
     (bsc#1197331)&lt;/li&gt;
	&lt;li&gt;CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c&lt;br/&gt;
     which could lead to an use-after-free if there is a corrupted quota&lt;br/&gt;
     file. (bnc#1197366)&lt;/li&gt;
	&lt;li&gt;CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP&lt;br/&gt;
     transformation code. This flaw allowed a local attacker with a normal&lt;br/&gt;
     user privilege to overwrite kernel heap objects and may cause a local&lt;br/&gt;
     privilege escalation. (bnc#1197462)&lt;/li&gt;
	&lt;li&gt;CVE-2022-0850: Fixed a kernel information leak vulnerability in&lt;br/&gt;
     iov_iter.c. (bsc#1196761)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1199: Fixed null-ptr-deref and use-after-free vulnerabilities&lt;br/&gt;
     that allow an attacker to crash the linux kernel by simulating Amateur&lt;br/&gt;
     Radio. (bsc#1198028)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1205: Fixed null pointer dereference and use-after-free&lt;br/&gt;
     vulnerabilities that allow an attacker to crash the linux kernel by&lt;br/&gt;
     simulating Amateur Radio. (bsc#1198027)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1198: Fixed an use-after-free vulnerability that allow an&lt;br/&gt;
     attacker to crash the linux kernel by simulating Amateur Radio&lt;br/&gt;
     (bsc#1198030).&lt;/li&gt;
	&lt;li&gt;CVE-2022-1195: Fixed an use-after-free vulnerability which could allow a&lt;br/&gt;
     local attacker with a user privilege to execute a denial of service.&lt;br/&gt;
     (bsc#1198029)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a&lt;br/&gt;
     local attacker to retireve (partial) /etc/shadow hashes or any other&lt;br/&gt;
     data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="69854">LU-15772</key>
            <summary>kernel update [SLES15 SP3 5.3.18-150300.59.63.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Thu, 21 Apr 2022 18:29:45 +0000</created>
                <updated>Sat, 18 Jun 2022 00:11:15 +0000</updated>
                            <resolved>Sat, 18 Jun 2022 00:11:15 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>1</watches>
                                                                            <comments>
                            <comment id="338068" author="yujian" created="Sat, 18 Jun 2022 00:11:15 +0000"  >&lt;p&gt;A new version is in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15958&quot; title=&quot;kernel update [SLES15 SP3 5.3.18-150300.59.71.2]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15958&quot;&gt;&lt;del&gt;LU-15958&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="69222">LU-15678</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="70805">LU-15958</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i02np3:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>