Changes

Jump to: navigation, search

Download/kernel/rhel6/042stab144.1/changes

1,839 bytes added, 05:21, 25 May 2020
Created page with "== Changes == Since {{kernel link|rhel6|042stab142.1}}: * Rebase to RHEL6u10 kernel 2.6.32-754.29.2.el6 * '''[Important]''' Kernel: KVM: OOB memory access via mmio ring buffe..."
== Changes ==
Since {{kernel link|rhel6|042stab142.1}}:

* Rebase to RHEL6u10 kernel 2.6.32-754.29.2.el6
* '''[Important]''' Kernel: KVM: OOB memory access via mmio ring buffer. (CVE-2019-14821)
* vzfs-to-ploop conversion on running container could crash the host. (PSBM-99030, PSBM-100878)
* Container stop operation could hang. (PSBM-100203)
* Container restore operation could crash the host due to incorrect symbolic link processing. (OVZ-7147)

* '''Important''' Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic. (CVE-2020-10711)
* '''Important''' kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow. (CVE-2019-17666)
* '''Important''' kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c. (CVE-2019-17133)
* '''Moderate''' kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c. (CVE-2020-11565)
* '''Moderate''' kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c. (CVE-2020-8648)
* '''Moderate''' kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. (CVE-2019-17055)
* '''Moderate''' kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service. (CVE-2019-15916)
* '''Low''' kernel: offset2lib allows for the stack guard page to be jumped over. (CVE-2017-1000371)
* Do not force memory reclaim during per-netns memory allocation for conntrack hash table. (PSBM-102730)

=== See also ===
* {{RHSA|2020-0790}}
* {{RHSA|2020-1524}}
* {{RHSA|2020-2103}}
* {{CVE|2017-1000371}}
* {{CVE|2019-19516}}
* {{CVE|2019-17055}}
* {{CVE|2019-17133}}
* {{CVE|2019-17666}}
* {{CVE|2020-8648}}
* {{CVE|2020-10711}}
* {{CVE|2020-11565}}

Navigation menu