<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:19:06 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-8615] kernel update [RHEL7.2 3.10.0-327.36.1.el7]</title>
                <link>https://jira.whamcloud.com/browse/LU-8615</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;Security Fix(es):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A security flaw was found in the Linux kernel in the mark_source_chains()&lt;br/&gt;
function in &quot;net/ipv4/netfilter/ip_tables.c&quot;. It is possible for a user-supplied&lt;br/&gt;
&quot;ipt_entry&quot; structure to have a large &quot;next_offset&quot; field. This field is not&lt;br/&gt;
bounds checked prior to writing to a counter value at the supplied offset.&lt;br/&gt;
(CVE-2016-3134, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit&lt;br/&gt;
systems. This flaw will allow attackers to alter arbitrary kernel memory when&lt;br/&gt;
unloading a kernel module. This action is usually restricted to root-privileged&lt;br/&gt;
users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS&lt;br/&gt;
and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997,&lt;br/&gt;
Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;An out-of-bounds heap memory access leading to a Denial of Service, heap&lt;br/&gt;
disclosure, or further impact was found in setsockopt(). The function call is&lt;br/&gt;
normally restricted to root, however some processes with cap_sys_admin may also&lt;br/&gt;
be able to trigger this flaw in privileged container environments.&lt;br/&gt;
(CVE-2016-4998, Moderate)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bug Fix(es):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;In some cases, running the ipmitool command caused a kernel panic due to a&lt;br/&gt;
race condition in the ipmi message handler. This update fixes the race&lt;br/&gt;
condition, and the kernel panic no longer occurs in the described scenario.&lt;br/&gt;
(BZ#1353947)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Previously, running I/O-intensive operations in some cases caused the system&lt;br/&gt;
to terminate unexpectedly after a null pointer dereference in the kernel. With&lt;br/&gt;
this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers&lt;br/&gt;
that fix this bug. As a result, the system no longer crashes in the described&lt;br/&gt;
scenario. (BZ#1362040)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Previously, the Stream Control Transmission Protocol (SCTP) sockets did not&lt;br/&gt;
inherit the SELinux labels properly. As a consequence, the sockets were labeled&lt;br/&gt;
with the unlabeled_t SELinux type which caused SCTP connections to fail. The&lt;br/&gt;
underlying source code has been modified, and SCTP connections now works as&lt;br/&gt;
expected. (BZ#1354302)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Previously, the bnx2x driver waited for transmission completions when&lt;br/&gt;
recovering from a parity event, which substantially increased the recovery time.&lt;br/&gt;
With this update, bnx2x does not wait for transmission completion in the&lt;br/&gt;
described circumstances. As a result, the recovery of bnx2x after a parity event&lt;br/&gt;
now takes less time. (BZ#1351972)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Enhancement(s):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;With this update, the audit subsystem enables filtering of processes by name&lt;br/&gt;
besides filtering by PID. Users can now audit by executable name (with the &quot;-F&lt;br/&gt;
exe=&amp;lt;path-to-executable&amp;gt;&quot; option), which allows expression of many new audit&lt;br/&gt;
rules. This functionality can be used to create events when specific&lt;br/&gt;
applications perform a syscall. (BZ#1345774)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;With this update, the Nonvolatile Memory Express (NVMe) and the multi-queue&lt;br/&gt;
block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version.&lt;br/&gt;
Previously, a race condition between timeout and freeing request in blk_mq&lt;br/&gt;
occurred, which could affect the blk_mq_tag_to_rq() function and consequently a&lt;br/&gt;
kernel oops could occur. The provided patch fixes this race condition by&lt;br/&gt;
updating the tags with the active request. The patch simplifies&lt;br/&gt;
blk_mq_tag_to_rq() and ensures that the two requests are not active at the same&lt;br/&gt;
time. (BZ#1350352)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;The Hyper-V storage driver (storvsc) has been upgraded from upstream. This&lt;br/&gt;
update provides moderate performance improvement of I/O operations when using&lt;br/&gt;
storvscr for certain workloads. (BZ#1360161)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1317383 - CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure&lt;br/&gt;
1349722 - CVE-2016-4997 kernel: compat IPT_SO_SET_REPLACE setsockopt&lt;br/&gt;
1349886 - CVE-2016-4998 kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt&lt;/p&gt;</description>
                <environment></environment>
        <key id="39843">LU-8615</key>
            <summary>kernel update [RHEL7.2 3.10.0-327.36.1.el7]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Wed, 14 Sep 2016 16:57:32 +0000</created>
                <updated>Tue, 11 Oct 2016 15:33:57 +0000</updated>
                            <resolved>Tue, 11 Oct 2016 15:33:57 +0000</resolved>
                                                    <fixVersion>Lustre 2.9.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>4</watches>
                                                                            <comments>
                            <comment id="166425" author="gerrit" created="Mon, 19 Sep 2016 19:11:00 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/22608&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/22608&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8615&quot; title=&quot;kernel update [RHEL7.2 3.10.0-327.36.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8615&quot;&gt;&lt;del&gt;LU-8615&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL7.2 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-327.36.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 6da55b695fe522cfdc70828dce7884535d775c8c&lt;/p&gt;</comment>
                            <comment id="167299" author="gerrit" created="Mon, 26 Sep 2016 16:40:08 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/22608/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/22608/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8615&quot; title=&quot;kernel update [RHEL7.2 3.10.0-327.36.1.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8615&quot;&gt;&lt;del&gt;LU-8615&lt;/del&gt;&lt;/a&gt; kernel: kernel update RHEL7.2 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-327.36.1.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 5cc29d71f670c70db0bec05c50285fb55d15f6a4&lt;/p&gt;</comment>
                            <comment id="169150" author="pjones" created="Tue, 11 Oct 2016 15:33:57 +0000"  >&lt;p&gt;Landed for 2.9&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzyokn:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>