<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 03:33:39 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-17221] kernel update [SLES15 SP4 5.14.21-150400.24.92.1]</title>
                <link>https://jira.whamcloud.com/browse/LU-17221</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security&lt;br/&gt;
and bugfixes.&lt;/p&gt;

&lt;p&gt;The following security bugs were fixed:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-4563: Fixed an use-after-free flaw in the nftables sub-component.&lt;br/&gt;
    This vulnerability could allow a local attacker to crash the system or lead&lt;br/&gt;
    to a kernel information leak problem. (bsc#1214727)&lt;/li&gt;
	&lt;li&gt;CVE-2023-39194: Fixed a flaw in the processing of state filters which could&lt;br/&gt;
    allow a local attackers to disclose sensitive information. (bsc#1215861)&lt;/li&gt;
	&lt;li&gt;CVE-2023-39193: Fixed a flaw in the processing of state filters which could&lt;br/&gt;
    allow a local attackers to disclose sensitive information. (bsc#1215860)&lt;/li&gt;
	&lt;li&gt;CVE-2023-39192: Fixed a flaw in the u32_match_it function which could allow&lt;br/&gt;
    a local attackers to disclose sensitive information. (bsc#1215858)&lt;/li&gt;
	&lt;li&gt;CVE-2023-42754: Fixed a null pointer dereference in ipv4_link_failure which&lt;br/&gt;
    could lead an authenticated attacker to trigger a DoS. (bsc#1215467)&lt;/li&gt;
	&lt;li&gt;CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client&lt;br/&gt;
    component which could be exploited to achieve local privilege escalation.&lt;br/&gt;
    (bsc#1215899)&lt;/li&gt;
	&lt;li&gt;CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization&lt;br/&gt;
    (SEV). An attacker can trigger a stack overflow and cause a denial of&lt;br/&gt;
    service or potentially guest-to-host escape in kernel configurations without&lt;br/&gt;
    stack guard pages. (bsc#1214022)&lt;/li&gt;
	&lt;li&gt;CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that&lt;br/&gt;
    could be exploited in order to leak internal kernel information or crash the&lt;br/&gt;
    system (bsc#1214351).&lt;/li&gt;
	&lt;li&gt;CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter&lt;br/&gt;
    subsystem. This issue may have allowed a local user to crash the system or&lt;br/&gt;
    potentially escalate their privileges (bsc#1215150).&lt;/li&gt;
	&lt;li&gt;CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup&lt;br/&gt;
    table. A user located in the local network or with a high bandwidth&lt;br/&gt;
    connection can increase the CPU usage of the server that accepts IPV6&lt;br/&gt;
    connections up to 95% (bsc#1212703).&lt;/li&gt;
	&lt;li&gt;CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network&lt;br/&gt;
    scheduler which could be exploited to achieve local privilege escalatio&lt;br/&gt;
    (bsc#1215275).&lt;/li&gt;
	&lt;li&gt;CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain&lt;br/&gt;
    sockets component which could be exploited to achieve local privilege&lt;br/&gt;
    escalation (bsc#1215117).&lt;/li&gt;
	&lt;li&gt;CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler&lt;br/&gt;
    which could be exploited to achieve local privilege escalation&lt;br/&gt;
    (bsc#1215115).&lt;/li&gt;
	&lt;li&gt;CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which&lt;br/&gt;
    could be exploited to crash the system (bsc#1210169).&lt;/li&gt;
	&lt;li&gt;CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem&lt;br/&gt;
    that could lead to potential information disclosure or a denial of service&lt;br/&gt;
    (bsc#1215221).&lt;/li&gt;
	&lt;li&gt;CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network&lt;br/&gt;
    protocol which could allow a user to crash the system (bsc#1210643).&lt;/li&gt;
	&lt;li&gt;CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread()&lt;br/&gt;
    (bsc#1208995).&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;The following non-security bugs were fixed:&lt;br/&gt;
&lt;a href=&quot;https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html&lt;/a&gt;&lt;/p&gt;</description>
                <environment></environment>
        <key id="78543">LU-17221</key>
            <summary>kernel update [SLES15 SP4 5.14.21-150400.24.92.1]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="yujian">Jian Yu</assignee>
                                    <reporter username="yujian">Jian Yu</reporter>
                        <labels>
                    </labels>
                <created>Tue, 24 Oct 2023 00:11:23 +0000</created>
                <updated>Sat, 18 Nov 2023 22:10:45 +0000</updated>
                            <resolved>Sat, 18 Nov 2023 22:10:45 +0000</resolved>
                                    <version>Lustre 2.16.0</version>
                    <version>Lustre 2.15.4</version>
                                    <fixVersion>Lustre 2.16.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="390407" author="gerrit" created="Tue, 24 Oct 2023 19:26:40 +0000"  >&lt;p&gt;&quot;Jian Yu &amp;lt;yujian@whamcloud.com&amp;gt;&quot; uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/c/fs/lustre-release/+/52820&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/c/fs/lustre-release/+/52820&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-17221&quot; title=&quot;kernel update [SLES15 SP4 5.14.21-150400.24.92.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-17221&quot;&gt;&lt;del&gt;LU-17221&lt;/del&gt;&lt;/a&gt; kernel: update SLES15 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.14.21-150400.24.92.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 92cf005d01e327e53bd312b411211ed2f1d827b9&lt;/p&gt;</comment>
                            <comment id="393513" author="gerrit" created="Sat, 18 Nov 2023 21:45:46 +0000"  >&lt;p&gt;&quot;Oleg Drokin &amp;lt;green@whamcloud.com&amp;gt;&quot; merged in patch &lt;a href=&quot;https://review.whamcloud.com/c/fs/lustre-release/+/52820/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/c/fs/lustre-release/+/52820/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-17221&quot; title=&quot;kernel update [SLES15 SP4 5.14.21-150400.24.92.1]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-17221&quot;&gt;&lt;del&gt;LU-17221&lt;/del&gt;&lt;/a&gt; kernel: update SLES15 SP4 &lt;span class=&quot;error&quot;&gt;&amp;#91;5.14.21-150400.24.92.1&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 8a4d0ed7d8b6a77a55b3c877e0f4f3dca60b6d67&lt;/p&gt;</comment>
                            <comment id="393533" author="pjones" created="Sat, 18 Nov 2023 22:10:45 +0000"  >&lt;p&gt;Landed for 2.16&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="77999">LU-17133</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|i03za7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>