<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:20:37 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-8796] kernel upgrade [RHEL7.3 3.10.0-514.el7]</title>
                <link>https://jira.whamcloud.com/browse/LU-8796</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;RHEL 7.3 was just announced as released.  It is now officially GA as of 11/3/16.&lt;/p&gt;

&lt;p&gt;This mod represents switching our supported el7 version from RHEL 7.2 to RHEL 7.3&lt;/p&gt;

&lt;p&gt;Details of the kernel upgrade will follow in comments.&lt;/p&gt;</description>
                <environment></environment>
        <key id="41282">LU-8796</key>
            <summary>kernel upgrade [RHEL7.3 3.10.0-514.el7]</summary>
                <type id="1" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11303&amp;avatarType=issuetype">Bug</type>
                                            <priority id="3" iconUrl="https://jira.whamcloud.com/images/icons/priorities/major.svg">Major</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Thu, 3 Nov 2016 14:26:41 +0000</created>
                <updated>Mon, 24 Apr 2017 16:33:01 +0000</updated>
                            <resolved>Fri, 18 Nov 2016 16:35:29 +0000</resolved>
                                                    <fixVersion>Lustre 2.9.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>6</watches>
                                                                            <comments>
                            <comment id="172165" author="bogl" created="Thu, 3 Nov 2016 14:29:08 +0000"  >&lt;p&gt;Security Fix(es):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It was found that the Linux kernel&apos;s IPv6 implementation mishandled socket&lt;br/&gt;
options. A local attacker could abuse concurrent access to the socket options to&lt;br/&gt;
escalate their privileges, or cause a denial of service (use-after-free and&lt;br/&gt;
system crash) via a crafted sendmsg system call. (CVE-2016-3841, Important)&lt;/li&gt;
&lt;/ul&gt;


&lt;ul&gt;
	&lt;li&gt;Several Moderate and Low impact security issues were found in the Linux&lt;br/&gt;
kernel. Space precludes documenting each of these issues in this advisory. Refer&lt;br/&gt;
to the CVE links in the References section for a description of each of these&lt;br/&gt;
vulnerabilities. (CVE-2013-4312, CVE-2015-8374, CVE-2015-8543, CVE-2015-8812,&lt;br/&gt;
CVE-2015-8844, CVE-2015-8845, CVE-2016-2053, CVE-2016-2069, CVE-2016-2847,&lt;br/&gt;
CVE-2016-3156, CVE-2016-4581, CVE-2016-4794, CVE-2016-5412, CVE-2016-5828,&lt;br/&gt;
CVE-2016-5829, CVE-2016-6136, CVE-2016-6198, CVE-2016-6327, CVE-2016-6480,&lt;br/&gt;
CVE-2015-8746, CVE-2015-8956, CVE-2016-2117, CVE-2016-2384, CVE-2016-3070,&lt;br/&gt;
CVE-2016-3699, CVE-2016-4569, CVE-2016-4578)&lt;/li&gt;
&lt;/ul&gt;


&lt;p&gt;Additional Changes:&lt;/p&gt;

&lt;p&gt;For detailed information on changes in this release, see the Red Hat Enterprise&lt;br/&gt;
Linux 7.3 Release Notes at &lt;a href=&quot;https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.3_Release_Notes/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bugs fixed (&lt;a href=&quot;https://bugzilla.redhat.com/):&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://bugzilla.redhat.com/):&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1141249 - Xen guests may hang after migration or suspend/resume&lt;br/&gt;
1234586 - Backtrace after unclean shutdown with XFS v5 and project quotas&lt;br/&gt;
1267042 - XFS needs to better handle EIO and ENOSPC&lt;br/&gt;
1277863 - Test case failure: Screen - Resolution after no Screen Boot on Intel Valley View Gen7 &lt;span class=&quot;error&quot;&gt;&amp;#91;8086:0f31&amp;#93;&lt;/span&gt;&lt;br/&gt;
1278224 - panic in iscsi_target.c&lt;br/&gt;
1283341 - cannot mount RHEL7 NFS server with nfsvers=4.1,sec=krb5 but nfsvers=4.0,sec=krb5 works&lt;br/&gt;
1286261 - CVE-2015-8374 kernel: Information leak when truncating of compressed/inlined extents on BTRFS&lt;br/&gt;
1286500 - Tool thin_dump failing to show &apos;mappings&apos;&lt;br/&gt;
1290475 - CVE-2015-8543 kernel: IPv6 connect causes DoS via NULL pointer dereference&lt;br/&gt;
1292481 - device mapper hung tasks on an openshift/docker system&lt;br/&gt;
1295802 - CVE-2015-8746 kernel: when NFSv4 migration is executed, kernel oops occurs at NFS client&lt;br/&gt;
1297813 - CVE-2013-4312 kernel: File descriptors passed over unix sockets are not properly accounted&lt;br/&gt;
1299662 - VFIO: include no-IOMMU mode - not supported&lt;br/&gt;
1300023 - soft lockup in nfs4_put_stid with 3.10.0-327.4.4.el7&lt;br/&gt;
1300237 - CVE-2016-2053 kernel: Kernel panic and system lockup by triggering BUG_ON() in public_key_verify_signature()&lt;br/&gt;
1301893 - CVE-2016-2069 kernel: race condition in the TLB flush logic&lt;br/&gt;
1302166 - MAC address of VF is not editable even when attached to host&lt;br/&gt;
1303532 - CVE-2015-8812 kernel: CXGB3: Logic bug in return code handling prematurely frees key structures causing Use after free or kernel panic.&lt;br/&gt;
1305118 - XFS support for deferred dio completion&lt;br/&gt;
1307091 - fstrim failing on mdadm raid 5 device&lt;br/&gt;
1308444 - CVE-2016-2384 kernel: double-free in usb-audio triggered by invalid USB descriptor&lt;br/&gt;
1308846 - CVE-2016-3070 kernel: Null pointer dereference in trace_writeback_dirty_page()&lt;br/&gt;
1312298 - CVE-2016-2117 kernel: Kernel memory leakage to ethernet frames due to buffer overflow in ethernet drivers&lt;br/&gt;
1313428 - CVE-2016-2847 kernel: pipe: limit the per-user amount of pages allocated in pipes&lt;br/&gt;
1318172 - CVE-2016-3156 kernel: ipv4: denial of service when destroying a network interface&lt;br/&gt;
1321096 - BUG: s390 socketcall() syscalls audited with wrong value in field a0&lt;br/&gt;
1326540 - CVE-2015-8845 CVE-2015-8844 kernel: incorrect restoration of machine specific registers from userspace&lt;br/&gt;
1329653 - CVE-2016-3699 kernel: ACPI table override allowed when securelevel is enabled&lt;br/&gt;
1333712 - CVE-2016-4581 kernel: Slave being first propagated copy causes oops in propagate_mnt&lt;br/&gt;
1334643 - CVE-2016-4569 kernel: Information leak in Linux sound module in timer.c&lt;br/&gt;
1335215 - CVE-2016-4578 kernel: Information leak in events in timer.c&lt;br/&gt;
1335889 - CVE-2016-4794 kernel: Use after free in array_map_alloc&lt;br/&gt;
1349539 - T460&lt;span class=&quot;error&quot;&gt;&amp;#91;p/s&amp;#93;&lt;/span&gt; audio output on dock won&apos;t work&lt;br/&gt;
1349916 - CVE-2016-5412 Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode&lt;br/&gt;
1349917 - CVE-2016-5828 Kernel: powerpc: tm: crash via exec system call on PPC&lt;br/&gt;
1350509 - CVE-2016-5829 kernel: Heap buffer overflow in hiddev driver&lt;br/&gt;
1353533 - CVE-2016-6136 kernel: Race condition vulnerability in execve argv arguments&lt;br/&gt;
1354525 - CVE-2016-6327 kernel: infiniband: Kernel crash by sending ABORT_TASK command&lt;br/&gt;
1355654 - CVE-2016-6198 kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs&lt;br/&gt;
1361245 - &lt;span class=&quot;error&quot;&gt;&amp;#91;Hyper-V&amp;#93;&lt;/span&gt;&lt;span class=&quot;error&quot;&gt;&amp;#91;RHEL 7.2&amp;#93;&lt;/span&gt; VMs panic when configured with Dynamic Memory as opposed to Static Memory&lt;br/&gt;
1362466 - CVE-2016-6480 kernel: scsi: aacraid: double fetch in ioctl_send_fib()&lt;br/&gt;
1364971 - CVE-2016-3841 kernel: use-after-free via crafted IPV6 sendmsg for raw / tcp / udp / l2tp sockets.&lt;br/&gt;
1383395 - CVE-2015-8956 kernel: NULL dereference in RFCOMM bind callback&lt;/p&gt;</comment>
                            <comment id="172170" author="gerrit" created="Thu, 3 Nov 2016 14:47:00 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;http://review.whamcloud.com/23560&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/23560&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8796&quot; title=&quot;kernel upgrade [RHEL7.3 3.10.0-514.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8796&quot;&gt;&lt;del&gt;LU-8796&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.3 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-514.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: ae7755f445042d7aad82b7ee046839a068b1d504&lt;/p&gt;</comment>
                            <comment id="174240" author="gerrit" created="Fri, 18 Nov 2016 15:35:27 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;http://review.whamcloud.com/23560/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;http://review.whamcloud.com/23560/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-8796&quot; title=&quot;kernel upgrade [RHEL7.3 3.10.0-514.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-8796&quot;&gt;&lt;del&gt;LU-8796&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.3 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-514.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: 5763c175c9a1a330b664a01bc08f329b2bee54f7&lt;/p&gt;</comment>
                            <comment id="174256" author="pjones" created="Fri, 18 Nov 2016 16:35:29 +0000"  >&lt;p&gt;Landed for 2.9&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10120">
                    <name>Blocker</name>
                                                                <inwardlinks description="is blocked by">
                                        <issuelink>
            <issuekey id="39078">LU-8534</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                                        </outwardlinks>
                                                                <inwardlinks description="is related to">
                                        <issuelink>
            <issuekey id="45380">LU-9310</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzyuc7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>