<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:14:52 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-8126] new kernel [RHEL6.8 2.6.32-642.el6]</title>
                <link>https://jira.whamcloud.com/browse/LU-8126</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;With the GA announcement of RHEL 6.8 on 5/10 we need to add content to lustre to allow building and running on it.&lt;/p&gt;

&lt;p&gt;This ticket is intended to cover all the changes needed in the lustre tree for this brand new distro release. This includes new target and config files for the new kernel version, new or revised base kernel and ldiskfs patches, and small incremental changes to lbuild and autoconf.&lt;/p&gt;
</description>
                <environment></environment>
        <key id="36839">LU-8126</key>
            <summary>new kernel [RHEL6.8 2.6.32-642.el6]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="3" iconUrl="https://jira.whamcloud.com/images/icons/priorities/major.svg">Major</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Tue, 10 May 2016 20:14:38 +0000</created>
                <updated>Thu, 14 Jun 2018 21:41:12 +0000</updated>
                            <resolved>Thu, 2 Jun 2016 11:53:46 +0000</resolved>
                                                    <fixVersion>Lustre 2.9.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>6</watches>
                                                                            <comments>
                            <comment id="151712" author="bogl" created="Tue, 10 May 2016 20:17:26 +0000"  >&lt;p&gt;Security Fix(es):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It was found that reporting emulation failures to user space could lead to&lt;br/&gt;
either a local (CVE-2014-7842) or a L2-&amp;gt;L1 (CVE-2010-5313) denial of service. In&lt;br/&gt;
the case of a local denial of service, an attacker must have access to the MMIO&lt;br/&gt;
area or be able to access an I/O port. Please note that on certain systems, HPET&lt;br/&gt;
is mapped to userspace as part of vdso (vvar) and thus an unprivileged user may&lt;br/&gt;
generate MMIO transactions (and enter the emulator) this way. (CVE-2010-5313,&lt;br/&gt;
CVE-2014-7842, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel did not properly account file descriptors&lt;br/&gt;
passed over the unix socket against the process limit. A local user could use&lt;br/&gt;
this flaw to exhaust all available memory on the system. (CVE-2013-4312,&lt;br/&gt;
Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A buffer overflow flaw was found in the way the Linux kernel&apos;s virtio-net&lt;br/&gt;
subsystem handled certain fraglists when the GRO (Generic Receive Offload)&lt;br/&gt;
functionality was enabled in a bridged network configuration. An attacker on the&lt;br/&gt;
local network could potentially use this flaw to crash the system, or, although&lt;br/&gt;
unlikely, elevate their privileges on the system. (CVE-2015-5156, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel&apos;s IPv6 network stack did not properly&lt;br/&gt;
validate the value of the MTU variable when it was set. A remote attacker could&lt;br/&gt;
potentially use this flaw to disrupt a target system&apos;s networking (packet loss)&lt;br/&gt;
by setting an invalid MTU value, for example, via a NetworkManager daemon that&lt;br/&gt;
is processing router advertisement packets running on the target system.&lt;br/&gt;
(CVE-2015-8215, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A NULL pointer dereference flaw was found in the way the Linux kernel&apos;s&lt;br/&gt;
network subsystem handled socket creation with an invalid protocol identifier. A&lt;br/&gt;
local user could use this flaw to crash the system. (CVE-2015-8543, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;It was found that the espfix functionality does not work for 32-bit KVM&lt;br/&gt;
paravirtualized guests. A local, unprivileged guest user could potentially use&lt;br/&gt;
this flaw to leak kernel stack addresses. (CVE-2014-8134, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was found in the way the Linux kernel&apos;s ext4 file system driver handled&lt;br/&gt;
non-journal file systems with an orphan list. An attacker with physical access&lt;br/&gt;
to the system could use this flaw to crash the system or, although unlikely,&lt;br/&gt;
escalate their privileges on the system. (CVE-2015-7509, Low)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A NULL pointer dereference flaw was found in the way the Linux kernel&apos;s ext4&lt;br/&gt;
file system driver handled certain corrupted file system images. An attacker&lt;br/&gt;
with physical access to the system could use this flaw to crash the system.&lt;br/&gt;
(CVE-2015-8324, Low)&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1066751 - tmpfs: creates files with inode number 0, rendering parent directory unremovable&lt;br/&gt;
1163762 - CVE-2010-5313 CVE-2014-7842 kernel: kvm: reporting emulation failures to userspace&lt;br/&gt;
1172765 - CVE-2014-8134 kernel: x86: espfix not working for 32-bit KVM paravirt guests&lt;br/&gt;
1197875 - CIFS DFS shares fail to mount when specifying sec= option&lt;br/&gt;
1225359 - bonding: fail to configure master mac address by initscripts&lt;br/&gt;
1242239 - md raid1 writemostly feature broken&lt;br/&gt;
1243852 - CVE-2015-5156 kernel: buffer overflow with fraglist larger than MAX_SKB_FRAGS + 2 in virtio-net&lt;br/&gt;
1248507 - kernel: &lt;span class=&quot;error&quot;&gt;&amp;#91;drm:cpt_set_fifo_underrun_reporting&amp;#93;&lt;/span&gt; &lt;b&gt;ERROR&lt;/b&gt; uncleared pch fifo underrun on pch transcoder A&lt;br/&gt;
1254020 - RHEL6.6: NFS client has kernel panic after seeing &apos;VFS: Busy inodes after unmount ... Self-destruct in 5 seconds. Have a nice day&apos;&lt;br/&gt;
1259222 - CVE-2015-7509 kernel: Mounting ext2 fs e2fsprogs/tests/f_orphan as ext4 crashes system&lt;br/&gt;
1259870 - Incomplete nl80211 backport broke hostapd&lt;br/&gt;
1267261 - CVE-2015-8324 kernel: Null pointer dereference when mounting ext4&lt;br/&gt;
1283253 - CVE-2015-8215 kernel: MTU value is not validated in IPv6 stack causing packet loss&lt;br/&gt;
1290475 - CVE-2015-8543 kernel: IPv6 connect causes DoS via NULL pointer dereference&lt;br/&gt;
1297813 - CVE-2013-4312 kernel: File descriptors passed over unix sockets are not properly accounted&lt;br/&gt;
1310661 - BUG: unable to handle kernel paging request at 65642072 followed by kernel panic&lt;br/&gt;
697750 - &lt;span class=&quot;error&quot;&gt;&amp;#91;xfs&amp;#93;&lt;/span&gt; concurrent aio/dio got stuck&lt;br/&gt;
723722 - BUG: SELinux is preventing /usr/bin/nautilus (deleted) &quot;write&quot; access on /media/TerraVolume.&lt;br/&gt;
889368 - LVM RAID: I/O can hang if entire stripe (mirror group) of RAID10 LV is killed while under snapshot&lt;/p&gt;</comment>
                            <comment id="151727" author="gerrit" created="Tue, 10 May 2016 21:37:52 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/20106&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/20106&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8126&quot; title=&quot;new kernel [RHEL6.8 2.6.32-642.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8126&quot;&gt;&lt;del&gt;LU-8126&lt;/del&gt;&lt;/a&gt; kernel: new kernel RHEL 6.8 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-642.el6&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: f66668731d2eb58ffa56d3bcc405cc9a9130c2bc&lt;/p&gt;</comment>
                            <comment id="154377" author="gerrit" created="Thu, 2 Jun 2016 04:40:52 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/20106/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/20106/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8126&quot; title=&quot;new kernel [RHEL6.8 2.6.32-642.el6]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8126&quot;&gt;&lt;del&gt;LU-8126&lt;/del&gt;&lt;/a&gt; kernel: new kernel RHEL 6.8 &lt;span class=&quot;error&quot;&gt;&amp;#91;2.6.32-642.el6&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: cb1609b32c21045655f7fe463d0c050c2667ebba&lt;/p&gt;</comment>
                            <comment id="154416" author="pjones" created="Thu, 2 Jun 2016 11:53:46 +0000"  >&lt;p&gt;Landed for 2.9&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10120">
                    <name>Blocker</name>
                                            <outwardlinks description="is blocking">
                                        <issuelink>
            <issuekey id="37309">LU-8227</issuekey>
        </issuelink>
                            </outwardlinks>
                                                                <inwardlinks description="is blocked by">
                                                        </inwardlinks>
                                    </issuelinktype>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="37207">LU-8205</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzyb67:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>