<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:22:45 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-15958] kernel update [SLES15 SP3 5.3.18-150300.59.71.2]</title>
                <link>https://jira.whamcloud.com/browse/LU-15958</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 15 SP3 kernel was updated.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2022-0168: Fixed a NULL pointer dereference in&lt;br/&gt;
     smb2_ioctl_query_info. (bsc#1197472)&lt;/li&gt;
	&lt;li&gt;CVE-2022-20008: Fixed bug that allows to read kernel heap memory due to&lt;br/&gt;
     uninitialized data in mmc_blk_read_single of block.c. (bnc#1199564)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to&lt;br/&gt;
     privilege escalation. (bsc#1200019)&lt;/li&gt;
	&lt;li&gt;CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited&lt;br/&gt;
     to speculatively/transiently disclose information via spectre like&lt;br/&gt;
     attacks. (bsc#1199650)&lt;/li&gt;
	&lt;li&gt;CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited&lt;br/&gt;
     to speculatively/transiently disclose information via spectre like&lt;br/&gt;
     attacks. (bsc#1199650)&lt;/li&gt;
	&lt;li&gt;CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited&lt;br/&gt;
     to speculatively/transiently disclose information via spectre like&lt;br/&gt;
     attacks. (bsc#1199650)&lt;/li&gt;
	&lt;li&gt;CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited&lt;br/&gt;
     to speculatively/transiently disclose information via spectre like&lt;br/&gt;
     attacks. (bsc#1199650)&lt;/li&gt;
	&lt;li&gt;CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited&lt;br/&gt;
     to speculatively/transiently disclose information via spectre like&lt;br/&gt;
     attacks. (bsc#1199650)&lt;/li&gt;
	&lt;li&gt;CVE-2019-19377: Fixed an user-after-free that could be triggered when an&lt;br/&gt;
     attacker mounts a crafted btrfs filesystem image. (bnc#1158266)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self&lt;br/&gt;
     (bsc#1199507).&lt;/li&gt;
	&lt;li&gt;CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when&lt;br/&gt;
     mounting and operating on a corrupted image. (bsc#1198577)&lt;/li&gt;
	&lt;li&gt;CVE-2022-1652: Fixed a statically allocated error counter inside the&lt;br/&gt;
     floppy kernel module (bsc#1199063).&lt;/li&gt;
	&lt;li&gt;CVE-2022-30594: Fixed restriction bypass on setting the&lt;br/&gt;
     PT_SUSPEND_SECCOMP flag (bnc#1199505).&lt;/li&gt;
	&lt;li&gt;CVE-2021-33061: Fixed insufficient control flow management for the&lt;br/&gt;
     Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed&lt;br/&gt;
     an authenticated user to potentially enable denial of service via local&lt;br/&gt;
     access (bnc#1196426).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="70805">LU-15958</key>
            <summary>kernel update [SLES15 SP3 5.3.18-150300.59.71.2]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Sat, 18 Jun 2022 00:09:41 +0000</created>
                <updated>Thu, 11 Aug 2022 17:31:33 +0000</updated>
                            <resolved>Thu, 11 Aug 2022 17:31:33 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="338303" author="gerrit" created="Wed, 22 Jun 2022 01:01:12 +0000"  >&lt;p&gt;&quot;Jian Yu &amp;lt;yujian@whamcloud.com&amp;gt;&quot; uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/47694&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/47694&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15958&quot; title=&quot;kernel update [SLES15 SP3 5.3.18-150300.59.71.2]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15958&quot;&gt;&lt;del&gt;LU-15958&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP3 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-150300.59.71.2&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: c8143661ecfe22882c99c513dff26877c29a115b&lt;/p&gt;</comment>
                            <comment id="343392" author="yujian" created="Thu, 11 Aug 2022 17:31:33 +0000"  >&lt;p&gt;A new version is in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-15958&quot; title=&quot;kernel update [SLES15 SP3 5.3.18-150300.59.71.2]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-15958&quot;&gt;&lt;del&gt;LU-15958&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="69854">LU-15772</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="71840">LU-16092</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i02shz:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>