<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:00:36 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-6481] Kernel update [RHEL6.6 2.6.32-504.16.2.el6]</title>
                <link>https://jira.whamcloud.com/browse/LU-6481</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way seunshare, a utility for running executables&lt;br/&gt;
under a different security context, used the capng_lock functionality of&lt;br/&gt;
the libcap-ng library. The subsequent invocation of suid root binaries that&lt;br/&gt;
relied on the fact that the setuid() system call, among others, also sets&lt;br/&gt;
the saved set-user-ID when dropping the binaries&apos; process privileges, could&lt;br/&gt;
allow a local, unprivileged user to potentially escalate their privileges&lt;br/&gt;
on the system. Note: the fix for this issue is the kernel part of the&lt;br/&gt;
overall fix, and introduces the PR_SET_NO_NEW_PRIVS functionality and the&lt;br/&gt;
related SELinux exec transitions support. (CVE-2014-3215, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A use-after-free flaw was found in the way the Linux kernel&apos;s SCTP&lt;br/&gt;
implementation handled authentication key reference counting during INIT&lt;br/&gt;
collisions. A remote attacker could use this flaw to crash the system or,&lt;br/&gt;
potentially, escalate their privileges on the system. (CVE-2015-1421,&lt;br/&gt;
Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel&apos;s KVM implementation did not ensure&lt;br/&gt;
that the host CR4 control register value remained unchanged across VM&lt;br/&gt;
entries on the same virtual CPU. A local, unprivileged user could use this&lt;br/&gt;
flaw to cause a denial of service on the system. (CVE-2014-3690, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An out-of-bounds memory access flaw was found in the syscall tracing&lt;br/&gt;
functionality of the Linux kernel&apos;s perf subsystem. A local, unprivileged&lt;br/&gt;
user could use this flaw to crash the system. (CVE-2014-7825, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An out-of-bounds memory access flaw was found in the syscall tracing&lt;br/&gt;
functionality of the Linux kernel&apos;s ftrace subsystem. On a system with&lt;br/&gt;
ftrace syscall tracing enabled, a local, unprivileged user could use this&lt;br/&gt;
flaw to crash the system, or escalate their privileges. (CVE-2014-7826,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel memory resource controller&apos;s (memcg)&lt;br/&gt;
handling of OOM (out of memory) conditions could lead to deadlocks.&lt;br/&gt;
An attacker able to continuously spawn new processes within a single&lt;br/&gt;
memory-constrained cgroup during an OOM event could use this flaw to lock&lt;br/&gt;
up the system. (CVE-2014-8171, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A race condition flaw was found in the way the Linux kernel keys&lt;br/&gt;
management subsystem performed key garbage collection. A local attacker&lt;br/&gt;
could attempt accessing a key while it was being garbage collected, which&lt;br/&gt;
would cause the system to crash. (CVE-2014-9529, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A stack-based buffer overflow flaw was found in the TechnoTrend/Hauppauge&lt;br/&gt;
DEC USB device driver. A local user with write access to the corresponding&lt;br/&gt;
device could use this flaw to crash the kernel or, potentially, elevate&lt;br/&gt;
their privileges on the system. (CVE-2014-8884, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An information leak flaw was found in the way the Linux kernel&apos;s ISO9660&lt;br/&gt;
file system implementation accessed data on an ISO9660 image with RockRidge&lt;br/&gt;
Extension Reference (ER) records. An attacker with physical access to the&lt;br/&gt;
system could use this flaw to disclose up to 255 bytes of kernel memory.&lt;br/&gt;
(CVE-2014-9584, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1156518 - CVE-2014-8369 kernel: kvm: excessive pages un-pinning in kvm_iommu_map error path&lt;br/&gt;
1163792 - CVE-2014-7822 kernel: splice: lack of generic write checks&lt;br/&gt;
1181166 - CVE-2014-8159 kernel: infiniband: uverbs: unprotected physical memory access&lt;br/&gt;
1182059 - CVE-2014-8160 kernel: iptables restriction bypass if a protocol handler kernel module not loaded&lt;/p&gt;</description>
                <environment></environment>
        <key id="29584">LU-6481</key>
            <summary>Kernel update [RHEL6.6 2.6.32-504.16.2.el6]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Tue, 21 Apr 2015 15:37:01 +0000</created>
                <updated>Sun, 1 Nov 2015 13:37:44 +0000</updated>
                            <resolved>Fri, 24 Apr 2015 17:57:51 +0000</resolved>
                                                    <fixVersion>Lustre 2.8.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>4</watches>
                                                                            <comments>
                            <comment id="113203" author="gerrit" created="Thu, 23 Apr 2015 13:54:01 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/14546&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/14546&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-6481&quot; title=&quot;Kernel update [RHEL6.6 2.6.32-504.16.2.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-6481&quot;&gt;&lt;del&gt;LU-6481&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL 6.6 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-504.16.2.el6&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 5a9a3d8e0c728f5610ac36d4c099d6fec211ddd8&lt;/p&gt;</comment>
                            <comment id="113318" author="gerrit" created="Fri, 24 Apr 2015 17:18:38 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/14546/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/14546/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-6481&quot; title=&quot;Kernel update [RHEL6.6 2.6.32-504.16.2.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-6481&quot;&gt;&lt;del&gt;LU-6481&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL 6.6 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-504.16.2.el6&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 7a16f91f00d015e727f6200e727e4c4a083bdf9b&lt;/p&gt;</comment>
                            <comment id="113331" author="pjones" created="Fri, 24 Apr 2015 17:57:51 +0000"  >&lt;p&gt;Landed for 2.8&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                                <inwardlinks description="is related to">
                                                        </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzxb67:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>