<!-- 
RSS generated by JIRA (9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c) at Sat Feb 10 02:29:32 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>Whamcloud Community JIRA</title>
    <link>https://jira.whamcloud.com</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>9.4.14</version>
        <build-number>940014</build-number>
        <build-date>05-12-2023</build-date>
    </build-info>


<item>
            <title>[LU-9816] kernel upgrade [RHEL7.4 3.10.0-693.el7]</title>
                <link>https://jira.whamcloud.com/browse/LU-9816</link>
                <project id="10000" key="LU">Lustre</project>
                    <description>&lt;p&gt;RHEL 7.4 was just announced as released. It is now officially GA as of 8/1/17.&lt;/p&gt;

&lt;p&gt;This mod represents switching our supported el7 version from RHEL 7.3 to RHEL 7.4&lt;/p&gt;

&lt;p&gt;Details of the kernel upgrade will follow in comments.&lt;/p&gt;</description>
                <environment></environment>
        <key id="47608">LU-9816</key>
            <summary>kernel upgrade [RHEL7.4 3.10.0-693.el7]</summary>
                <type id="4" iconUrl="https://jira.whamcloud.com/secure/viewavatar?size=xsmall&amp;avatarId=11310&amp;avatarType=issuetype">Improvement</type>
                                            <priority id="4" iconUrl="https://jira.whamcloud.com/images/icons/priorities/minor.svg">Minor</priority>
                        <status id="5" iconUrl="https://jira.whamcloud.com/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="success"/>
                                    <resolution id="1">Fixed</resolution>
                                        <assignee username="bogl">Bob Glossman</assignee>
                                    <reporter username="bogl">Bob Glossman</reporter>
                        <labels>
                    </labels>
                <created>Tue, 1 Aug 2017 15:07:15 +0000</created>
                <updated>Tue, 3 Oct 2017 03:32:28 +0000</updated>
                            <resolved>Thu, 17 Aug 2017 04:35:52 +0000</resolved>
                                                    <fixVersion>Lustre 2.10.1</fixVersion>
                    <fixVersion>Lustre 2.11.0</fixVersion>
                                        <due></due>
                            <votes>0</votes>
                                    <watches>2</watches>
                                                                            <comments>
                            <comment id="204071" author="bogl" created="Tue, 1 Aug 2017 15:10:40 +0000"  >&lt;p&gt;Security Fix(es):&lt;/p&gt;

&lt;p&gt;An use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system. (CVE-2016-10200, Important)&lt;br/&gt;
A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type-&amp;gt;match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges. (CVE-2017-2647, Important)&lt;br/&gt;
It was found that the NFSv4 server in the Linux kernel did not properly validate layout type when processing NFSv4 pNFS LAYOUTGET and GETDEVICEINFO operands. A remote attacker could use this flaw to soft-lockup the system and thus cause denial of service. (CVE-2017-8797, Important)&lt;/p&gt;

&lt;p&gt;This update also fixes multiple Moderate and Low impact security issues:&lt;/p&gt;

&lt;p&gt;CVE-2015-8839, CVE-2015-8970, CVE-2016-9576, CVE-2016-7042, CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588, CVE-2016-9806, CVE-2016-10088, CVE-2016-10147, CVE-2017-2596, CVE-2017-2671, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951, CVE-2017-7187, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890, CVE-2017-9074, CVE-2017-8890, CVE-2017-9075, CVE-2017-8890, CVE-2017-9076, CVE-2017-8890, CVE-2017-9077, CVE-2017-9242, CVE-2014-7970, CVE-2014-7975, CVE-2016-6213, CVE-2016-9604, CVE-2016-9685&lt;/p&gt;

&lt;p&gt;More documentation of these issues are in the release notes; &lt;a href=&quot;https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.4_Release_Notes/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Fixes&lt;/p&gt;

&lt;p&gt;BZ - 1151095 - CVE-2014-7970 Kernel: fs: VFS denial of service&lt;br/&gt;
BZ - 1151108 - CVE-2014-7975 Kernel: fs: umount denial of service&lt;br/&gt;
BZ - 1178491 - intel_rapl: no valid rapl domains found in package 0&quot;&lt;br/&gt;
BZ - 1283257 - &lt;span class=&quot;error&quot;&gt;&amp;#91;RFE&amp;#93;&lt;/span&gt; IOMMU support in Vhost-net&lt;br/&gt;
BZ - 1322495 - CVE-2016-6213 kernel: user namespace: unlimited consumed of kernel mount resources &lt;span class=&quot;error&quot;&gt;&amp;#91;rhel-7.4&amp;#93;&lt;/span&gt;&lt;br/&gt;
BZ - 1323577 - CVE-2015-8839 kernel: ext4 filesystem page fault race condition with fallocate call.&lt;br/&gt;
BZ - 1330000 - kernel: Backport getrandom system call&lt;br/&gt;
BZ - 1349647 - NFS client may keep phantom directory entry in dcache when rename is canceled&lt;br/&gt;
BZ - 1352741 - tx array support in tun&lt;br/&gt;
BZ - 1356471 - CVE-2016-6213 kernel: Overflowing kernel mount table using shared bind mount&lt;br/&gt;
BZ - 1368577 - kernel crash after a few hours/days with NFS 4.1 and 4.2 enabled&lt;br/&gt;
BZ - 1368938 - CVE-2016-7097 kernel: Setting a POSIX ACL via setxattr doesn&apos;t clear the setgid bit&lt;br/&gt;
BZ - 1371693 - Processes on nfs client have very high cpu usage in rpcauth_lookup_credcache&lt;br/&gt;
BZ - 1371714 - btrfs module init creates a useless file in /sys/kernel/debug with 0666 permissions&lt;br/&gt;
BZ - 1373966 - CVE-2016-7042 kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled&lt;br/&gt;
BZ - 1378656 - &lt;span class=&quot;error&quot;&gt;&amp;#91;LLNL 7.4 Bug&amp;#93;&lt;/span&gt; Serious Performance regression with NATed IPoIB connected mode&lt;br/&gt;
BZ - 1383739 - BUG: Dentry ffff880232eeacc0&lt;/p&gt;
{i=800fe1,n=f290}
&lt;p&gt; still in use (1)&lt;br/&gt;
BZ - 1386286 - CVE-2015-8970 kernel: crypto: GPF in lrw_crypt caused by null-deref&lt;br/&gt;
BZ - 1389433 - CVE-2016-9604 kernel: security: The built-in keyrings for security tokens can be joined as a session and then modified by the root user&lt;br/&gt;
BZ - 1391299 - &lt;span class=&quot;error&quot;&gt;&amp;#91;LLNL 7.4 Bug&amp;#93;&lt;/span&gt; Crash in Infiniband rdmavt layer when kernel consumer exhausts queue pairs&lt;br/&gt;
BZ - 1393904 - CVE-2016-8645 kernel: a BUG() statement can be hit in net/ipv4/tcp_input.c&lt;br/&gt;
BZ - 1394089 - &lt;span class=&quot;error&quot;&gt;&amp;#91;LLNL 7.4 Bug&amp;#93;&lt;/span&gt; 7.3 regression: the kernel does not create the /sys/block/&amp;lt;sd device&amp;gt;/devices/enclosure_device symlinks&lt;br/&gt;
BZ - 1395104 - pci 0000:ff:1e.3: &lt;span class=&quot;error&quot;&gt;&amp;#91;Firmware Bug&amp;#93;&lt;/span&gt;: reg 0x10: invalid BAR (can&apos;t size)&lt;br/&gt;
BZ - 1396578 - RFE: Backport virtio-net multi-queue enablement by default patch&lt;br/&gt;
BZ - 1396941 - CVE-2016-9685 kernel: Memory leaks in xfs_attr_list.c error paths&lt;br/&gt;
BZ - 1399830 - GFS2: fallocate error message during gfs2_grow&lt;br/&gt;
BZ - 1401433 - Vhost tx batching&lt;br/&gt;
BZ - 1401436 - lockless en-queuing for vhost&lt;br/&gt;
BZ - 1401502 - CVE-2016-9806 kernel: netlink: double-free in netlink_dump&lt;br/&gt;
BZ - 1403145 - CVE-2016-9576 kernel: Use after free in SCSI generic device interface&lt;br/&gt;
BZ - 1404200 - CVE-2016-10147 kernel: Kernel crash by spawning mcrypt(alg) with incompatible algorithm&lt;br/&gt;
BZ - 1404924 - CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest leads to DoS&lt;br/&gt;
BZ - 1406885 - server supports labeled NFS by default&lt;br/&gt;
BZ - 1412210 - CVE-2016-10088 kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression)&lt;br/&gt;
BZ - 1412234 - extend virtio-net to expose host MTU to guest&lt;br/&gt;
BZ - 1415780 - File permissions are not getting set as expected on nfs v4.0 mount&lt;br/&gt;
BZ - 1416532 - Symlinks removed and replaced on an nfs mount from another system receive STALE nfs error and EIO from readlink()&lt;br/&gt;
BZ - 1417812 - CVE-2017-2596 Kernel: kvm: page reference leakage in handle_vmon&lt;br/&gt;
BZ - 1418962 - Broken net:&lt;span class=&quot;error&quot;&gt;&amp;#91;...&amp;#93;&lt;/span&gt; instead of path for net namespaces in /proc/self/mounts&lt;br/&gt;
BZ - 1421638 - CVE-2017-5970 kernel: ipv4: Invalid IP options could cause skb-&amp;gt;dst drop&lt;br/&gt;
BZ - 1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls&lt;br/&gt;
BZ - 1424076 - vxlan: performance can suffer unless GRO is disabled on vxlan interface&lt;br/&gt;
BZ - 1428353 - CVE-2017-2647 kernel: Null pointer dereference in search_keyring&lt;br/&gt;
BZ - 1428684 - RFE: Backport of ICMP ratelimit fixes.&lt;br/&gt;
BZ - 1428973 - PANIC: &quot;kernel BUG at fs/ceph/addr.c:91!&quot;&lt;br/&gt;
BZ - 1430225 - kernel: fix crash in uio_release&lt;br/&gt;
BZ - 1430347 - CVE-2016-10200 kernel: l2tp: Race condition in the L2TPv3 IP encapsulation feature&lt;br/&gt;
BZ - 1433252 - CVE-2017-6951 kernel: NULL pointer dereference in keyring_search_aux function&lt;br/&gt;
BZ - 1433831 - NVMe SSD fails to initialize on AWS i3.4xlarge instances&lt;br/&gt;
BZ - 1434327 - CVE-2017-7187 kernel: scsi: Stack-based buffer overflow in sg_ioctl function&lt;br/&gt;
BZ - 1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race&lt;br/&gt;
BZ - 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c&lt;br/&gt;
BZ - 1443999 - Deadlock in reshape on single core machine&lt;br/&gt;
BZ - 1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism&lt;br/&gt;
BZ - 1445054 - Setting ipv6.disable=1 prevents both IPv4 and IPv6 socket opening for VXLAN tunnels&lt;br/&gt;
BZ - 1448312 - kernel panics in mce_register_decode_chain when booted on qemu&lt;br/&gt;
BZ - 1450203 - Irrelevant upper layer protocol traffic may erroneously &quot;confirm&quot; neigh entries&lt;br/&gt;
BZ - 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c&lt;br/&gt;
BZ - 1452679 - CVE-2017-9074 kernel: net: IPv6 fragmentation implementation of nexthdr field may be associated with an invalid option&lt;br/&gt;
BZ - 1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance&lt;br/&gt;
BZ - 1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance&lt;br/&gt;
BZ - 1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance&lt;br/&gt;
BZ - 1456388 - CVE-2017-9242 kernel: Incorrect overwrite check in __ip6_append_data()&lt;br/&gt;
BZ - 1463241 - rlimit_stack problems after update to 3.10.0-514.21.2.el7, and JVM Crash after updating to kernel-3.10.0-514.21.2.el7.x86_64&lt;br/&gt;
BZ - 1466329 - CVE-2017-8797 kernel: NFSv4 server does not properly validate layout type when processing NFSv4 pNFS LAYOUTGET operand&lt;/p&gt;

&lt;p&gt;CVEs&lt;/p&gt;

&lt;p&gt;CVE-2014-7970&lt;br/&gt;
CVE-2014-7975&lt;br/&gt;
CVE-2015-8839&lt;br/&gt;
CVE-2015-8970&lt;br/&gt;
CVE-2016-10088&lt;br/&gt;
CVE-2016-10147&lt;br/&gt;
CVE-2016-10200&lt;br/&gt;
CVE-2016-6213&lt;br/&gt;
CVE-2016-7042&lt;br/&gt;
CVE-2016-7097&lt;br/&gt;
CVE-2016-8645&lt;br/&gt;
CVE-2016-9576&lt;br/&gt;
CVE-2016-9588&lt;br/&gt;
CVE-2016-9604&lt;br/&gt;
CVE-2016-9685&lt;br/&gt;
CVE-2016-9806&lt;br/&gt;
CVE-2017-2596&lt;br/&gt;
CVE-2017-2647&lt;br/&gt;
CVE-2017-2671&lt;br/&gt;
CVE-2017-5970&lt;br/&gt;
CVE-2017-6001&lt;br/&gt;
CVE-2017-6951&lt;br/&gt;
CVE-2017-7187&lt;br/&gt;
CVE-2017-7616&lt;br/&gt;
CVE-2017-7889&lt;br/&gt;
CVE-2017-8797&lt;br/&gt;
CVE-2017-8890&lt;br/&gt;
CVE-2017-9074&lt;br/&gt;
CVE-2017-9075&lt;br/&gt;
CVE-2017-9076&lt;br/&gt;
CVE-2017-9077&lt;br/&gt;
CVE-2017-9242&lt;/p&gt;</comment>
                            <comment id="204075" author="gerrit" created="Tue, 1 Aug 2017 15:22:26 +0000"  >&lt;p&gt;Bob Glossman (bob.glossman@intel.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/28301&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/28301&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-9816&quot; title=&quot;kernel upgrade [RHEL7.4 3.10.0-693.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-9816&quot;&gt;&lt;del&gt;LU-9816&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.4 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-693.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: 20ad2664285fdf3f362db5ec5d4cf4ab33e0e30d&lt;/p&gt;</comment>
                            <comment id="205348" author="gerrit" created="Mon, 14 Aug 2017 17:35:51 +0000"  >&lt;p&gt;Minh Diep (minh.diep@intel.com) uploaded a new patch: &lt;a href=&quot;https://review.whamcloud.com/28532&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/28532&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-9816&quot; title=&quot;kernel upgrade [RHEL7.4 3.10.0-693.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-9816&quot;&gt;&lt;del&gt;LU-9816&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.4 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-693.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_10&lt;br/&gt;
Current Patch Set: 1&lt;br/&gt;
Commit: cf25ca414779e0381485fd1cbd3a665296d3ecfb&lt;/p&gt;</comment>
                            <comment id="205581" author="gerrit" created="Thu, 17 Aug 2017 01:30:33 +0000"  >&lt;p&gt;Oleg Drokin (oleg.drokin@intel.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/28301/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/28301/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-9816&quot; title=&quot;kernel upgrade [RHEL7.4 3.10.0-693.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-9816&quot;&gt;&lt;del&gt;LU-9816&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.4 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-693.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: master&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: fd8ef48571a2752f6c6a4c47127178a765d5b328&lt;/p&gt;</comment>
                            <comment id="205594" author="pjones" created="Thu, 17 Aug 2017 04:35:52 +0000"  >&lt;p&gt;Landed for 2.11&lt;/p&gt;</comment>
                            <comment id="208523" author="gerrit" created="Fri, 15 Sep 2017 17:41:02 +0000"  >&lt;p&gt;John L. Hammond (john.hammond@intel.com) merged in patch &lt;a href=&quot;https://review.whamcloud.com/28532/&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://review.whamcloud.com/28532/&lt;/a&gt;&lt;br/&gt;
Subject: &lt;a href=&quot;https://jira.whamcloud.com/browse/LU-9816&quot; title=&quot;kernel upgrade [RHEL7.4 3.10.0-693.el7]&quot; class=&quot;issue-link&quot; data-issue-key=&quot;LU-9816&quot;&gt;&lt;del&gt;LU-9816&lt;/del&gt;&lt;/a&gt; kernel: kernel upgrade RHEL7.4 &lt;span class=&quot;error&quot;&gt;&amp;#91;3.10.0-693.el7&amp;#93;&lt;/span&gt;&lt;br/&gt;
Project: fs/lustre-release&lt;br/&gt;
Branch: b2_10&lt;br/&gt;
Current Patch Set: &lt;br/&gt;
Commit: b982381f9cdbe7a04900f4192af054619f35b12b&lt;/p&gt;</comment>
                    </comments>
                <issuelinks>
                            <issuelinktype id="10120">
                    <name>Blocker</name>
                                                                <inwardlinks description="is blocked by">
                                        <issuelink>
            <issuekey id="39872">LU-8619</issuekey>
        </issuelink>
                            </inwardlinks>
                                    </issuelinktype>
                            <issuelinktype id="10322">
                    <name>Gantt End to Start</name>
                                            <outwardlinks description="has to be done before">
                                        <issuelink>
            <issuekey id="47829">LU-9882</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                            <issuelinktype id="10011">
                    <name>Related</name>
                                            <outwardlinks description="is related to ">
                                        <issuelink>
            <issuekey id="47113">LU-9738</issuekey>
        </issuelink>
                            </outwardlinks>
                                                        </issuelinktype>
                    </issuelinks>
                <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                                                                                                                                            <customfield id="customfield_10890" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        <customfield id="customfield_10390" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1|hzzhk7:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10090" key="com.pyxis.greenhopper.jira:gh-global-rank">
                        <customfieldname>Rank (Obsolete)</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>9223372036854775807</customfieldvalue>
                        </customfieldvalues>
                    </customfield>
                                                                                            <customfield id="customfield_10060" key="com.atlassian.jira.plugin.system.customfieldtypes:select">
                        <customfieldname>Severity</customfieldname>
                        <customfieldvalues>
                                <customfieldvalue key="10022"><![CDATA[3]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                        </customfields>
    </item>
</channel>
</rss>