<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:26:00 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-16325] kernel update [SLES15 SP3 5.3.18-150300.59.101.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-16325</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2021-4037: Fixed function logic vulnerability that allowed local&lt;br/&gt;
     users to create files for the XFS file-system with an unintended group&lt;br/&gt;
     ownership and with group execution and SGID permission bits set&lt;br/&gt;
     (bnc#1198702).&lt;/li&gt;
	&lt;li&gt;CVE-2022-2153: Fixed vulnerability in KVM that could allow an&lt;br/&gt;
     unprivileged local attacker on the host to cause DoS (bnc#1200788).&lt;/li&gt;
	&lt;li&gt;CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices&lt;br/&gt;
     (bnc#1202686).&lt;/li&gt;
	&lt;li&gt;CVE-2022-2978: Fixed use-after-free in the NILFS file system that could&lt;br/&gt;
     lead to local privilege escalation or DoS (bnc#1202700).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE&lt;br/&gt;
     (bnc#1203391).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3424: Fixed use-after-free in gru_set_context_option(),&lt;br/&gt;
     gru_fault() and gru_handle_user_call_os() that could lead to kernel&lt;br/&gt;
     panic (bsc#1204166).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3521: Fixed race condition in kcm_tx_work() in&lt;br/&gt;
     net/kcm/kcmsock.c (bnc#1204355).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6&lt;br/&gt;
     handler (bnc#1204354).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in&lt;br/&gt;
     drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in&lt;br/&gt;
     drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3545: Fixed use-after-free in area_cache_get() in&lt;br/&gt;
     drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3565: Fixed use-after-free in del_timer() in&lt;br/&gt;
     drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device&lt;br/&gt;
     driver that could lead to local privilege escalation or DoS&lt;br/&gt;
     (bnc#1204470).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could&lt;br/&gt;
     allow a local unprivileged user to cause a denial of service&lt;br/&gt;
     (bnc#1204439).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3594: Fixed excessive data logging in intr_callback() in&lt;br/&gt;
     drivers/net/usb/r8152.c (bnc#1204479).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3621: Fixed null pointer dereference in&lt;br/&gt;
     nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3625: Fixed use-after-free in&lt;br/&gt;
     devlink_param_set()/devlink_param_get() in net/core/devlink.c&lt;br/&gt;
     (bnc#1204637).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3629: Fixed memory leak in vsock_connect() in&lt;br/&gt;
     net/vmw_vsock/af_vsock.c (bnc#1204635).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in&lt;br/&gt;
     net/bluetooth/l2cap_core.c (bnc#1204619).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in&lt;br/&gt;
     fs/nilfs2/segment.c (bnc#1204646).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in&lt;br/&gt;
     fs/nilfs2/inode.c (bnc#1204647).&lt;/li&gt;
	&lt;li&gt;CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow&lt;br/&gt;
     unprivileged guest users to compromise the guest kernel via TLB flush&lt;br/&gt;
     operations on preempted vCPU (bnc#1203066).&lt;/li&gt;
	&lt;li&gt;CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf&lt;br/&gt;
     anon_vma double reuse (bnc#1204168).&lt;/li&gt;
	&lt;li&gt;CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space&lt;br/&gt;
     client to corrupt the monitor&apos;s internal memory (bnc#1204653).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="73327">LU-16325</key>
            <summary>kernel update [SLES15 SP3 5.3.18-150300.59.101.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Fri, 18 Nov 2022 20:21:52 +0000</created>
                <updated>Fri, 23 Dec 2022 21:58:52 +0000</updated>
                            <resolved>Fri, 23 Dec 2022 21:58:52 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="353577" author="gerrit" created="Fri, 18 Nov 2022 20:27:01 +0000"  >&lt;p&gt;&quot;Jian Yu &amp;lt;yujian@whamcloud.com&amp;gt;&quot; uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/c/fs/lustre-release/+/49195&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/c/fs/lustre-release/+/49195&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-16325&quot; title=&quot;kernel update [SLES15 SP3 5.3.18-150300.59.101.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-16325&quot;&gt;&lt;del&gt;LU-16325&lt;/del&gt;&lt;/a&gt; kernel: kernel update SLES15 SP3 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.3.18-150300.59.101.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 592eb3839fd0223fed657c68bbe7418613772b89&lt;/p&gt;</comment>
                            <comment id="357363" author="yujian" created="Fri, 23 Dec 2022 21:58:52 +0000"  >&lt;p&gt;A newer kernel version is available in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-16432&quot; title=&quot;kernel update [SLES15 SP3 5.3.18-150300.59.106.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-16432&quot;&gt;&lt;del&gt;LU-16432&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="72965">LU-16273</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="73737">LU-16432</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i03653:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>