<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:06:31 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-7162] Kernel update for RHEL7.1 [3.10.0-229.14.1.el7]</title>
                <link>https://jira.whamcloud.com/browse/LU-7162</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;ul&gt;
	&lt;li&gt;A flaw was found in the kernel&apos;s implementation of the Berkeley Packet&lt;br/&gt;
Filter (BPF). A local attacker could craft BPF code to crash the system by&lt;br/&gt;
creating a situation in which the JIT compiler would fail to correctly&lt;br/&gt;
optimize the JIT image on the last pass. This would lead to the CPU&lt;br/&gt;
executing instructions that were not part of the JIT code. (CVE-2015-4700,&lt;br/&gt;
Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Two flaws were found in the way the Linux kernel&apos;s networking&lt;br/&gt;
implementation handled UDP packets with incorrect checksum values. A remote&lt;br/&gt;
attacker could potentially use these flaws to trigger an infinite loop in&lt;br/&gt;
the kernel, resulting in a denial of service on the system, or cause a&lt;br/&gt;
denial of service in applications using the edge triggered epoll&lt;br/&gt;
functionality. (CVE-2015-5364, CVE-2015-5366, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s ext4 file system handled&lt;br/&gt;
the &quot;page size &amp;gt; block size&quot; condition when the fallocate zero range&lt;br/&gt;
functionality was used. A local attacker could use this flaw to crash the&lt;br/&gt;
system. (CVE-2015-0275, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel&apos;s keyring implementation would leak&lt;br/&gt;
memory when adding a key to a keyring via the add_key() function. A local&lt;br/&gt;
attacker could use this flaw to exhaust all available memory on the system.&lt;br/&gt;
(CVE-2015-1333, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A race condition flaw was found in the way the Linux kernel&apos;s SCTP&lt;br/&gt;
implementation handled Address Configuration lists when performing Address&lt;br/&gt;
Configuration Change (ASCONF). A local attacker could use this flaw to&lt;br/&gt;
crash the system via a race condition triggered by setting certain ASCONF&lt;br/&gt;
options on a socket. (CVE-2015-3212, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An information leak flaw was found in the way the Linux kernel&apos;s Virtual&lt;br/&gt;
Dynamic Shared Object (vDSO) implementation performed address&lt;br/&gt;
randomization. A local, unprivileged user could use this flaw to leak&lt;br/&gt;
kernel memory addresses to user-space. (CVE-2014-9585, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1181054 - CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library&lt;br/&gt;
1193907 - CVE-2015-0275 kernel: fs: ext4: fallocate zero range page size &amp;gt; block size BUG()&lt;br/&gt;
1226442 - CVE-2015-3212 kernel: SCTP race condition allows list corruption and panic from userlevel&lt;br/&gt;
1233615 - CVE-2015-4700 kernel: Crafted BPF filters may crash kernel during JIT optimisation&lt;br/&gt;
1239029 - CVE-2015-5366 CVE-2015-5364 kernel: net: incorrect processing of checksums in UDP implementation&lt;br/&gt;
1245658 - CVE-2015-1333 kernel: denial of service due to memory leak in add_key()&lt;/p&gt;</description>
                <environment></environment>
        <key id="32139">LU-7162</key>
            <summary>Kernel update for RHEL7.1 [3.10.0-229.14.1.el7]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Tue, 15 Sep 2015 17:44:20 +0000</created>
                <updated>Fri, 1 Jul 2016 18:51:04 +0000</updated>
                            <resolved>Wed, 7 Oct 2015 16:57:18 +0000</resolved>
                                                    <fixVersion>Lustre 2.8.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>4</watches>
                                                                            <comments>
                            <comment id="127489" author="gerrit" created="Wed, 16 Sep 2015 14:47:47 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/16444&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/16444&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-7162&quot; title=&quot;Kernel update for RHEL7.1 [3.10.0-229.14.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-7162&quot;&gt;&lt;del&gt;LU-7162&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL 7.1 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-229.14.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 630ab8520855f339d12614f1b1f07fa6d6fc1d3c&lt;/p&gt;</comment>
                            <comment id="129690" author="gerrit" created="Wed, 7 Oct 2015 15:13:13 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/16444/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/16444/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-7162&quot; title=&quot;Kernel update for RHEL7.1 [3.10.0-229.14.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-7162&quot;&gt;&lt;del&gt;LU-7162&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL 7.1 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-229.14.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 846efa4d098d3becb74bad343ba6adb6abc8b394&lt;/p&gt;</comment>
                            <comment id="129704" author="jgmitter" created="Wed, 7 Oct 2015 16:57:18 +0000"  >&lt;p&gt;Landed for 2.8.&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzxno7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>