<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openvz.org/index.php?action=history&amp;feed=atom&amp;title=Download%2Fkernel%2Frhel6%2F042stab134.3%2Fchanges</id>
	<title>Download/kernel/rhel6/042stab134.3/changes - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openvz.org/index.php?action=history&amp;feed=atom&amp;title=Download%2Fkernel%2Frhel6%2F042stab134.3%2Fchanges"/>
	<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab134.3/changes&amp;action=history"/>
	<updated>2026-05-14T17:50:23Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.1</generator>
	<entry>
		<id>https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab134.3/changes&amp;diff=23036&amp;oldid=prev</id>
		<title>Vvs: Created page with &quot;== Changes == Since {{kernel link|rhel6|042stab133.2}}:  * Rebase to RHEL6u10 kernel 2.6.32-754.6.3.el6 * '''[Important]''' A flaw named FragmentSmack was found in the way the...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.openvz.org/index.php?title=Download/kernel/rhel6/042stab134.3/changes&amp;diff=23036&amp;oldid=prev"/>
		<updated>2018-10-15T11:41:39Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Changes == Since {{kernel link|rhel6|042stab133.2}}:  * Rebase to RHEL6u10 kernel 2.6.32-754.6.3.el6 * &amp;#039;&amp;#039;&amp;#039;[Important]&amp;#039;&amp;#039;&amp;#039; A flaw named FragmentSmack was found in the way the...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Changes ==&lt;br /&gt;
Since {{kernel link|rhel6|042stab133.2}}:&lt;br /&gt;
&lt;br /&gt;
* Rebase to RHEL6u10 kernel 2.6.32-754.6.3.el6&lt;br /&gt;
* '''[Important]''' A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)&lt;br /&gt;
* '''[Important]''' An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system (Mutagen Astronomy). (CVE-2018-14634)&lt;br /&gt;
* '''[Low]''' The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIMIT_INFINITY, but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. (CVE-2017-1000365)&lt;br /&gt;
* Under certain circumstances, ploop could crash after failed execution of kernel thread. (PSBM-88559)&lt;br /&gt;
* Under certain circumstances, Acronis Backup could trigger host crash in blk_cbt_update_size(). (PSBM-88570)&lt;br /&gt;
* Under certain circumstances, host could crash inside Acronis snumbd driver. (PSBM-88575)&lt;br /&gt;
* Under certain circumstances, Acronis Backup could trigger host hard lockup in __cbt_flush_cpu_cache. (PSBM-89323)&lt;br /&gt;
* Fixed locking in blk_release_queue() that led to hard lockup in blk_throtl_drain() (was broken in 2.6.32-754.6.3.el6 RHEL6 kernel). (PSBM-89391, RHBZ #1638926)&lt;br /&gt;
&lt;br /&gt;
=== See also ===&lt;br /&gt;
* {{RHSA|2018-2846}}&lt;br /&gt;
* {{CVE|2017-14364}}&lt;br /&gt;
* {{CVE|2018-5391}}&lt;br /&gt;
* {{CVE|2017-1000365}}&lt;br /&gt;
* https://access.redhat.com/security/vulnerabilities/mutagen-astronomy&lt;br /&gt;
* https://access.redhat.com/articles/3553061&lt;/div&gt;</summary>
		<author><name>Vvs</name></author>
		
	</entry>
</feed>