<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 01:56:26 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-6011] Kernel update [RHEL7 3.10.0-123.13.1.el7]</title>
                <link>https://jira.whamcloud.com/browse/LU-6011</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s SCTP implementation&lt;br/&gt;
handled malformed or duplicate Address Configuration Change Chunks&lt;br/&gt;
(ASCONF). A remote attacker could use either of these flaws to crash the&lt;br/&gt;
system. (CVE-2014-3673, CVE-2014-3687, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s SCTP implementation&lt;br/&gt;
handled the association&apos;s output queue. A remote attacker could send&lt;br/&gt;
specially crafted packets that would cause the system to use an excessive&lt;br/&gt;
amount of memory, leading to a denial of service. (CVE-2014-3688,&lt;br/&gt;
Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Two flaws were found in the way the Apple Magic Mouse/Trackpad&lt;br/&gt;
multi-touch driver and the Minibox PicoLCD driver handled invalid HID&lt;br/&gt;
reports. An attacker with physical access to the system could use these&lt;br/&gt;
flaws to crash the system or, potentially, escalate their privileges on the&lt;br/&gt;
system. (CVE-2014-3181, CVE-2014-3186, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A memory corruption flaw was found in the way the USB ConnectTech&lt;br/&gt;
WhiteHEAT serial driver processed completion commands sent via USB Request&lt;br/&gt;
Blocks buffers. An attacker with physical access to the system could use&lt;br/&gt;
this flaw to crash the system or, potentially, escalate their privileges on&lt;br/&gt;
the system. (CVE-2014-3185, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s keys subsystem handled the&lt;br/&gt;
termination condition in the associative array garbage collection&lt;br/&gt;
functionality. A local, unprivileged user could use this flaw to crash the&lt;br/&gt;
system. (CVE-2014-3631, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Multiple flaws were found in the way the Linux kernel&apos;s ALSA&lt;br/&gt;
implementation handled user controls. A local, privileged user could use&lt;br/&gt;
either of these flaws to crash the system. (CVE-2014-4654, CVE-2014-4655,&lt;br/&gt;
CVE-2014-4656, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s VFS subsystem handled&lt;br/&gt;
reference counting when performing unmount operations on symbolic links.&lt;br/&gt;
A local, unprivileged user could use this flaw to exhaust all available&lt;br/&gt;
memory on the system or, potentially, trigger a use-after-free error,&lt;br/&gt;
resulting in a system crash or privilege escalation. (CVE-2014-5045,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the get_dumpable() function return value was&lt;br/&gt;
interpreted in the ptrace subsystem of the Linux kernel. When&lt;br/&gt;
&apos;fs.suid_dumpable&apos; was set to 2, a local, unprivileged local user could&lt;br/&gt;
use this flaw to bypass intended ptrace restrictions and obtain&lt;br/&gt;
potentially sensitive information. (CVE-2013-2929, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A stack overflow flaw caused by infinite recursion was found in the way&lt;br/&gt;
the Linux kernel&apos;s UDF file system implementation processed indirect ICBs.&lt;br/&gt;
An attacker with physical access to the system could use a specially&lt;br/&gt;
crafted UDF image to crash the system. (CVE-2014-6410, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An information leak flaw in the way the Linux kernel handled media device&lt;br/&gt;
enumerate entities IOCTL requests could allow a local user able to access&lt;br/&gt;
the /dev/media0 device file to leak kernel memory bytes. (CVE-2014-1739,&lt;br/&gt;
Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An out-of-bounds read flaw in the Logitech Unifying receiver driver could&lt;br/&gt;
allow an attacker with physical access to the system to crash the system&lt;br/&gt;
or, potentially, escalate their privileges on the system. (CVE-2014-3182,&lt;br/&gt;
Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Multiple out-of-bounds write flaws were found in the way the Cherry&lt;br/&gt;
Cymotion keyboard driver, KYE/Genius device drivers, Logitech device&lt;br/&gt;
drivers, Monterey Genius KB29E keyboard driver, Petalynx Maxter remote&lt;br/&gt;
control driver, and Sunplus wireless desktop driver handled invalid HID&lt;br/&gt;
reports. An attacker with physical access to the system could use either of&lt;br/&gt;
these flaws to write data past an allocated memory buffer. (CVE-2014-3184,&lt;br/&gt;
Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An information leak flaw was found in the RAM Disks Memory Copy (rd_mcp)&lt;br/&gt;
back end driver of the iSCSI Target subsystem could allow a privileged user&lt;br/&gt;
to leak the contents of kernel memory to an iSCSI initiator remote client.&lt;br/&gt;
(CVE-2014-4027, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An information leak flaw in the Linux kernel&apos;s ALSA implementation could&lt;br/&gt;
allow a local, privileged user to leak kernel memory to user space.&lt;br/&gt;
(CVE-2014-4652, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1028148 - CVE-2013-2929 kernel: exec/ptrace: get_dumpable() incorrect tests&lt;br/&gt;
1108744 - CVE-2014-4027 Kernel: target/rd: imformation leakage&lt;br/&gt;
1109774 - CVE-2014-1739 Kernel: drivers: media: an information leakage&lt;br/&gt;
1113406 - CVE-2014-4652 Kernel: ALSA: control: protect user controls against races &amp;amp; memory disclosure&lt;br/&gt;
1113445 - CVE-2014-4654 CVE-2014-4655 Kernel: ALSA: control: use-after-free in replacing user controls&lt;br/&gt;
1113470 - CVE-2014-4656 Kernel: ALSA: control: integer overflow in id.index &amp;amp; id.numid&lt;br/&gt;
1122472 - CVE-2014-5045 kernel: vfs: refcount issues during unmount on symlink&lt;br/&gt;
1140325 - CVE-2014-3631 kernel: keys: incorrect termination condition in assoc array garbage collection&lt;br/&gt;
1141173 - CVE-2014-3181 Kernel: HID: OOB write in magicmouse driver&lt;br/&gt;
1141210 - CVE-2014-3182 Kernel: HID: logitech-dj OOB array access&lt;br/&gt;
1141391 - CVE-2014-3184 Kernel: HID: off by one error in various _report_fixup routines&lt;br/&gt;
1141400 - CVE-2014-3185 Kernel: USB serial: memory corruption flaw&lt;br/&gt;
1141407 - CVE-2014-3186 Kernel: HID: memory corruption via OOB write&lt;br/&gt;
1141809 - CVE-2014-6410 kernel: udf: Avoid infinite loop when processing indirect ICBs&lt;br/&gt;
1147850 - CVE-2014-3673 kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks&lt;br/&gt;
1155731 - CVE-2014-3687 kernel: net: sctp: fix panic on duplicate ASCONF chunks&lt;br/&gt;
1155745 - CVE-2014-3688 kernel: net: sctp: remote memory pressure from excessive queueing&lt;/p&gt;</description>
                <environment></environment>
        <key id="27855">LU-6011</key>
            <summary>Kernel update [RHEL7 3.10.0-123.13.1.el7]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="2" iconUrl="https://jira.whamcloud.com/images/icons/priorities/critical.svg">Critical</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                            <label>HB</label>
                    </labels>
                <created>Tue, 9 Dec 2014 22:23:45 +0000</created>
                <updated>Fri, 19 Dec 2014 16:06:03 +0000</updated>
                            <resolved>Wed, 17 Dec 2014 14:48:59 +0000</resolved>
                                                    <fixVersion>Lustre 2.7.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>4</watches>
                                                                            <comments>
                            <comment id="101205" author="bogl" created="Wed, 10 Dec 2014 15:17:48 +0000"  >&lt;p&gt;&lt;a href=&quot;http://review.whamcloud.com/13022&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/13022&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="101206" author="bogl" created="Wed, 10 Dec 2014 15:28:47 +0000"  >&lt;p&gt;build is failing due to not finding kernel rpm for build.  I checked to see that the rpms are already in Centos, and they are there.  I must assume that they landed there too late to be swept into our local repos.  Since I think we refresh nightly, I&apos;ll try again tomorrow.&lt;/p&gt;</comment>
                            <comment id="101786" author="gerrit" created="Wed, 17 Dec 2014 03:57:34 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/13022/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/13022/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-6011&quot; title=&quot;Kernel update [RHEL7 3.10.0-123.13.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-6011&quot;&gt;&lt;del&gt;LU-6011&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;RHEL7 3.10.0-123.13.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 64ea261c346133b28e4b144103a800711fc604d0&lt;/p&gt;</comment>
                            <comment id="101810" author="jlevi" created="Wed, 17 Dec 2014 14:48:59 +0000"  >&lt;p&gt;Patch landed to Master.&lt;/p&gt;</comment>
                            <comment id="102062" author="gerrit" created="Fri, 19 Dec 2014 16:06:03 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/13152&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/13152&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-6011&quot; title=&quot;Kernel update [RHEL7 3.10.0-123.13.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-6011&quot;&gt;&lt;del&gt;LU-6011&lt;/del&gt;&lt;/a&gt; kernel: kernel update &lt;span class=&quot;error&quot;&gt;&amp;#91;RHEL7 3.10.0-123.13.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 8ee5aaa46c77b46e428c7f6650dd95b39447eaf1&lt;/p&gt;</comment>
                    </comments>
                    <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzx27r:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>16753</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>