<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:26:01 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-16326] kernel update [SLES15 SP4 5.14.21-150400.24.33.2]</title>
                <link>https://jira.whamcloud.com/browse/LU-16326</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;   The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various&lt;br/&gt;
   security and bugfixes.&lt;/p&gt;

&lt;p&gt;   The following security bugs were fixed:&lt;/p&gt;

&lt;ul class=&quot;alternate&quot; type=&quot;square&quot;&gt;
	&lt;li&gt;CVE-2022-28748: Fixed a leak of kernel memory over the network by&lt;br/&gt;
     ax88179_178a devices (bsc#1196018).&lt;/li&gt;
	&lt;li&gt;CVE-2022-1882: Fixed a use-after-free flaw in free_pipe_info() that&lt;br/&gt;
     could allow a local user to crash or potentially escalate their&lt;br/&gt;
     privileges on the system (bsc#1199904).&lt;/li&gt;
	&lt;li&gt;CVE-2022-2964: Fixed memory corruption issues in ax88179_178a devices&lt;br/&gt;
     (bnc#1202686).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3169: Fixed an denial of service though request to&lt;br/&gt;
     NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET (bsc#1203290).&lt;/li&gt;
	&lt;li&gt;CVE-2022-33981: Fixed a use-after-free in floppy driver (bnc#1200692).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3424: Fixed use-after-free in gru_set_context_option(),&lt;br/&gt;
     gru_fault() and gru_handle_user_call_os() that could lead to kernel&lt;br/&gt;
     panic (bsc#1204166).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3435: Fixed an out-of-bounds read in fib_nh_match() of the file&lt;br/&gt;
     net/ipv4/fib_semantics.c (bsc#1204171).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3521: Fixed race condition in kcm_tx_work() in&lt;br/&gt;
     net/kcm/kcmsock.c (bnc#1204355).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6&lt;br/&gt;
     handler (bnc#1204354).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3526: Fixed a memory leak in macvlan_handle_frame() from&lt;br/&gt;
     drivers/net/macvlan.c (bnc#1204353).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3545: Fixed use-after-free in area_cache_get() in&lt;br/&gt;
     drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3565: Fixed use-after-free in del_timer() in&lt;br/&gt;
     drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3621: Fixed null pointer dereference in&lt;br/&gt;
     nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3625: Fixed use-after-free in&lt;br/&gt;
     devlink_param_set()/devlink_param_get() in net/core/devlink.c&lt;br/&gt;
     (bnc#1204637).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3628: Fixed potential buffer overflow in&lt;br/&gt;
     brcmf_fweh_event_worker() in wifi/brcmfmac (bsc#1204868).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in&lt;br/&gt;
     net/bluetooth/l2cap_core.c (bnc#1204619).&lt;/li&gt;
	&lt;li&gt;CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in&lt;br/&gt;
     fs/nilfs2/segment.c (bnc#1204646).&lt;/li&gt;
	&lt;li&gt;CVE-2022-40476: Fixed a null pointer dereference in fs/io_uring.c&lt;br/&gt;
     (bnc#1203435).&lt;/li&gt;
	&lt;li&gt;CVE-2022-40768: Fixed information disclosure in stex_queuecommand_lck&lt;br/&gt;
     (bnc#1203514).&lt;/li&gt;
	&lt;li&gt;CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space&lt;br/&gt;
     client to corrupt the monitor&apos;s internal memory (bnc#1204653).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;   The following non-security bugs were fixed:&lt;br/&gt;
   &lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="73328">LU-16326</key>
            <summary>kernel update [SLES15 SP4 5.14.21-150400.24.33.2]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="2">Won&apos;t Fix</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Fri, 18 Nov 2022 20:29:49 +0000</created>
                <updated>Wed, 21 Dec 2022 20:36:51 +0000</updated>
                            <resolved>Wed, 21 Dec 2022 20:36:51 +0000</resolved>
                                                                        <due></due>
                            <votes>0</votes>
                                    <watches>1</watches>
                                                                            <comments>
                            <comment id="357171" author="yujian" created="Wed, 21 Dec 2022 20:36:51 +0000"  >&lt;p&gt;A new kernel is available in &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-16422&quot; title=&quot;kernel update [SLES15 SP4 5.14.21-150400.24.38.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-16422&quot;&gt;&lt;del&gt;LU-16422&lt;/del&gt;&lt;/a&gt;.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="73081">LU-16294</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="73713">LU-16422</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i0365b:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>