<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 01:54:07 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-5740] Kernel upgrade [RHEL6.6 2.6.32-504.el6]</title>
                <link>https://jira.whamcloud.com/browse/LU-5740</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;ul&gt;
	&lt;li&gt;A NULL pointer dereference flaw was found in the way the Linux kernel&apos;s&lt;br/&gt;
Stream Control Transmission Protocol (SCTP) implementation handled&lt;br/&gt;
simultaneous connections between the same hosts. A remote attacker could&lt;br/&gt;
use this flaw to crash the system. (CVE-2014-5077, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An integer overflow flaw was found in the way the Linux kernel&apos;s Frame&lt;br/&gt;
Buffer device implementation mapped kernel memory to user space via the&lt;br/&gt;
mmap syscall. A local user able to access a frame buffer device file&lt;br/&gt;
(/dev/fb*) could possibly use this flaw to escalate their privileges on the&lt;br/&gt;
system. (CVE-2013-2596, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the ipc_rcu_putref() function in the Linux&lt;br/&gt;
kernel&apos;s IPC implementation handled reference counter decrementing.&lt;br/&gt;
A local, unprivileged user could use this flaw to trigger an Out of Memory&lt;br/&gt;
(OOM) condition and, potentially, crash the system. (CVE-2013-4483,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the permission checks performed by the Linux kernel&lt;br/&gt;
when a netlink message was received were not sufficient. A local,&lt;br/&gt;
unprivileged user could potentially bypass these restrictions by passing a&lt;br/&gt;
netlink socket as stdout or stderr to a more privileged process and&lt;br/&gt;
altering the output of this process. (CVE-2014-0181, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the try_to_unmap_cluster() function in the Linux&lt;br/&gt;
kernel&apos;s Memory Managment subsystem did not properly handle page locking in&lt;br/&gt;
certain cases, which could potentially trigger the BUG_ON() macro in the&lt;br/&gt;
mlock_vma_page() function. A local, unprivileged user could use this flaw&lt;br/&gt;
to crash the system. (CVE-2014-3122, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s kvm_iommu_map_pages()&lt;br/&gt;
function handled IOMMU mapping failures. A privileged user in a guest with&lt;br/&gt;
an assigned host device could use this flaw to crash the host.&lt;br/&gt;
(CVE-2014-3601, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Multiple use-after-free flaws were found in the way the Linux kernel&apos;s&lt;br/&gt;
Advanced Linux Sound Architecture (ALSA) implementation handled user&lt;br/&gt;
controls. A local, privileged user could use either of these flaws to crash&lt;br/&gt;
the system. (CVE-2014-4653, CVE-2014-4654, CVE-2014-4655, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s VFS subsystem handled&lt;br/&gt;
reference counting when performing unmount operations on symbolic links.&lt;br/&gt;
A local, unprivileged user could use this flaw to exhaust all available&lt;br/&gt;
memory on the system or, potentially, trigger a use-after-free error,&lt;br/&gt;
resulting in a system crash or privilege escalation. (CVE-2014-5045,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An integer overflow flaw was found in the way the lzo1x_decompress_safe()&lt;br/&gt;
function of the Linux kernel&apos;s LZO implementation processed Literal Runs.&lt;br/&gt;
A local attacker could, in extremely rare cases, use this flaw to crash the&lt;br/&gt;
system or, potentially, escalate their privileges on the system.&lt;br/&gt;
(CVE-2014-4608, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1010882 - kvm: backport &quot;Improve create VCPU parameter&quot;&lt;br/&gt;
1024854 - CVE-2013-4483 kernel: ipc: ipc_rcu_putref refcount races&lt;br/&gt;
1027480 - alb_send_learning_packets using an obsolete EtherType&lt;br/&gt;
1030411 - resizing thin-snapshot with external origin should return zeros behind origin&apos;s end&lt;br/&gt;
1031488 - Restore the mask bit correctly in eoi_ioapic_irq()&lt;br/&gt;
1034490 - CVE-2013-2596 kernel: integer overflow in fb_mmap&lt;br/&gt;
1036972 - use after free in new nfsd DRC code&lt;br/&gt;
1044438 - cifs: Unable to append to an existing file in cache=none mode.&lt;br/&gt;
1059496 - KVM: x86 emulator: Implement jmp far opcode ff/5&lt;br/&gt;
1063836 - kvm: 23090: cpu0 unhandled wrmsr 0x391 data 2000000f&lt;br/&gt;
1065304 - kernel/sched: incorrect setup of sched_group-&amp;gt;cpu_power for NUMA systems&lt;br/&gt;
1069028 - ixgbevf prematurely strips VLAN tags&lt;br/&gt;
1072373 - Along with the increase of vCPUs in guest, and guest OS will spend more time to boot up in specified machine.&lt;br/&gt;
1077463 - gfs2: quotas not refreshed in gfs2_adjust_quota&lt;br/&gt;
1090423 - Data integrity issue on rebuilding RAID 6 with 100MB resync speed&lt;br/&gt;
1093076 - CVE-2014-3122 Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking&lt;br/&gt;
1094265 - CVE-2014-0181 kernel: net: insufficient permision checks of netlink messages&lt;br/&gt;
1095627 - missing vhost schedule causing thread starvation&lt;br/&gt;
1100523 - ext4 filesystem option &apos;max_batch_time&apos; actually displays &apos;min_batch_time&apos; in /proc/mounts&lt;br/&gt;
1113409 - CVE-2014-4653 Kernel: ALSA: control: do not access controls outside of protected regions&lt;br/&gt;
1113445 - CVE-2014-4654 CVE-2014-4655 Kernel: ALSA: control: use-after-free in replacing user controls&lt;br/&gt;
1113899 - CVE-2014-4608 kernel: lzo1x_decompress_safe() integer overflow&lt;br/&gt;
1118123 - &lt;span class=&quot;error&quot;&gt;&amp;#91;Hyper-V&amp;#93;&lt;/span&gt;&lt;span class=&quot;error&quot;&gt;&amp;#91;REHL 6.6&amp;#93;&lt;/span&gt; fcopy large file from host to guest failed&lt;br/&gt;
1122472 - CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlink&lt;br/&gt;
1122982 - CVE-2014-5077 Kernel: net: SCTP: fix a NULL pointer dereference during INIT collisions&lt;br/&gt;
1124351 - raid1 Data corruption after recovery with bitmap&lt;br/&gt;
1127231 - dmeventd hanging while handling lost leg in RAID1 LV&lt;br/&gt;
1131951 - CVE-2014-3601 kernel: kvm: invalid parameter passing in kvm_iommu_map_pages()&lt;br/&gt;
739866 - checkpolicy cannot parse /selinux/policy on ppc64 and s390x&lt;br/&gt;
786463 - nfs mount hangs when kerberos ticket expires&lt;br/&gt;
889471 - &lt;span class=&quot;error&quot;&gt;&amp;#91;Btrfs&amp;#93;&lt;/span&gt; BUG: unable to handle kernel NULL pointer dereference at (null) btrfs_get_sb should return error when open_ctree failed&lt;br/&gt;
915862 - The sync mount option does not work for NFSv4 mounts in RHEL6&lt;br/&gt;
997651 - possible recursive locking detected&lt;br/&gt;
998024 - nfsd sometimes grants delegations too soon following conflicting open requests&lt;/p&gt;</description>
                <environment></environment>
        <key id="27001">LU-5740</key>
            <summary>Kernel upgrade [RHEL6.6 2.6.32-504.el6]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="6" iconUrl="https://jira.whamcloud.com/images/icons/statuses/closed.png" description="The issue is considered finished, the resolution is correct. Issues which are closed can be reopened.">Closed</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Tue, 14 Oct 2014 14:37:52 +0000</created>
                <updated>Fri, 24 Apr 2015 14:01:14 +0000</updated>
                            <resolved>Fri, 21 Nov 2014 21:22:07 +0000</resolved>
                                                    <fixVersion>Lustre 2.7.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>8</watches>
                                                                            <comments>
                            <comment id="96399" author="bogl" created="Wed, 15 Oct 2014 16:17:04 +0000"  >&lt;p&gt;Makefile for the new kernel says:&lt;/p&gt;

&lt;p&gt;RHEL_MAJOR = 6&lt;br/&gt;
RHEL_MINOR = 6&lt;/p&gt;

&lt;p&gt;This means it&apos;s really an el6.6 kernel even though it appears here in an update for el6.5.&lt;/p&gt;</comment>
                            <comment id="96485" author="ys" created="Thu, 16 Oct 2014 15:14:22 +0000"  >&lt;p&gt;RHEL6.6 has released. &lt;/p&gt;</comment>
                            <comment id="97020" author="bogl" created="Wed, 22 Oct 2014 15:37:15 +0000"  >&lt;p&gt;redefined this ticket as an upgrade from el6.5 to el6.6, since the kernel involved is really a 6.6 kernel.  Discussion with Joshua has convinced me we should treat this as an upgrade to the next release rather than an update to the current release.&lt;/p&gt;

&lt;p&gt;This ticket probably won&apos;t proceed until we see Centos 6.6.  That still hasn&apos;t happened yet, although the release of 6.6 by RedHat is over a week old.&lt;/p&gt;</comment>
                            <comment id="97029" author="sebastien.buisson" created="Wed, 22 Oct 2014 16:11:35 +0000"  >&lt;p&gt;Hi,&lt;/p&gt;

&lt;p&gt;The thing is RedHat has published a RHEL 6 security fix based on 2.6.32-504.el6 kernel (RHSA-2014:1392-01). So support for this kernel is kind of mandatory now.&lt;/p&gt;

&lt;p&gt;Sebastien.&lt;/p&gt;</comment>
                            <comment id="97036" author="bogl" created="Wed, 22 Oct 2014 17:04:15 +0000"  >&lt;p&gt;Yes, I know Red Hat published it as a security update.  I quoted extensively from RHSA-2014:1392-01 in my description.  However we can&apos;t deploy it in our build and test framework until it&apos;s available under Centos, and it seems that will only be in their 6.6 release.  That fact plus the fact that internal evidence in the Makefile and #include files show that it really is a 6.6 kernel, not a 6.5 one, persuaded me to take the upgrade approach.&lt;/p&gt;

&lt;p&gt;I had initially intended to provide the new kernel as a 6.5 update as we had done for many past kernel version bumps in el6.  I was talked out of that approach.&lt;/p&gt;

&lt;p&gt;Hopefully it won&apos;t be too much longer until we can make this happen.&lt;/p&gt;
</comment>
                            <comment id="97834" author="patrick.valentin" created="Wed, 29 Oct 2014 15:06:00 +0000"  >&lt;p&gt;Hi Bob,&lt;br/&gt;
As we have to quickly deliver a lustre 2.5.3 supporting this RHEL 6 security fix, I have back-ported your patch, provided by Peter Jones on last monday. The changes compared to your master branch patch are minor, and I have attached a file containing this backport.&lt;br/&gt;
Patrick.&lt;/p&gt;</comment>
                            <comment id="98358" author="bogl" created="Tue, 4 Nov 2014 21:05:58 +0000"  >&lt;p&gt;&lt;a href=&quot;http://review.whamcloud.com/12560&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/12560&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="98522" author="bogl" created="Thu, 6 Nov 2014 15:47:55 +0000"  >&lt;p&gt;It&apos;s been decided to enable building on both el6.6 and el6.5, not abandoning el6.5 for el6.6.  This means the mod above, &lt;a href=&quot;http://review.whamcloud.com/12560&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/12560&lt;/a&gt;, will probably be replaced soon by a different one.&lt;/p&gt;</comment>
                            <comment id="98609" author="bogl" created="Thu, 6 Nov 2014 21:58:06 +0000"  >&lt;p&gt;&lt;a href=&quot;http://review.whamcloud.com/12609&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/12609&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="99795" author="gerrit" created="Fri, 21 Nov 2014 20:25:56 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/12609/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/12609/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-5740&quot; title=&quot;Kernel upgrade [RHEL6.6 2.6.32-504.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-5740&quot;&gt;&lt;del&gt;LU-5740&lt;/del&gt;&lt;/a&gt; build: add RHEL6.6 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-504.el6&amp;#93;&lt;/span&gt; to build selections&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 1ba98baf8be1622464faca80ffaeec7a01a04978&lt;/p&gt;</comment>
                            <comment id="99804" author="bogl" created="Fri, 21 Nov 2014 21:22:07 +0000"  >&lt;p&gt;fix landed in master&lt;/p&gt;</comment>
                            <comment id="101100" author="gerrit" created="Tue, 9 Dec 2014 17:01:59 +0000"  >&lt;p&gt;James Simmons (uja.ornl@gmail.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/13008&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/13008&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-5740&quot; title=&quot;Kernel upgrade [RHEL6.6 2.6.32-504.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-5740&quot;&gt;&lt;del&gt;LU-5740&lt;/del&gt;&lt;/a&gt; build: add RHEL6.6 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-504.el6&amp;#93;&lt;/span&gt; to build selections&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_5&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 475f16de4d43e5f11d711f0534ca4f305ec4e3c9&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10120">
                    <name>Blocker</name>
                                            <outwardlinks description="is blocking">
                                        <issuelink>
            <issuekey id="27556">LU-5909</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="27048">LU-5755</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                            <attachment id="16269" name="patch_backport_to_lustre_253.txt" size="24277" author="patrick.valentin" created="Wed, 29 Oct 2014 15:06:00 +0000"/>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzwyhz:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>16113</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>