Difference between revisions of "News/updates"
< News
(028stab120.1 to -testing) |
(028stab120.1 to -stable) |
||
Line 23: | Line 23: | ||
<!-- *DO NOT REMOVE THIS LINE* new news should go here --> | <!-- *DO NOT REMOVE THIS LINE* new news should go here --> | ||
+ | == Kernel RHEL5 stable 028stab120.1 == | ||
+ | |||
+ | * Rebase to RHEL5 kernel 2.6.32-408.el5 | ||
+ | * A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366) | ||
+ | |||
+ | {{Download link|kernel/rhel5/028stab120.1}} | ||
+ | |||
+ | --[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 07:30, 2 February 2016 (EST) | ||
== Kernel RHEL5 testing 028stab120.1 == | == Kernel RHEL5 testing 028stab120.1 == | ||
Line 31: | Line 39: | ||
--[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 04:30, 25 January 2016 (EST) | --[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 04:30, 25 January 2016 (EST) | ||
− | == Kernel RHEL5 028stab119.6 == | + | |
+ | == Kernel RHEL5 stable 028stab119.6 == | ||
* Improved accounting for network-related memory objects (PCLIN-32553) | * Improved accounting for network-related memory objects (PCLIN-32553) |
Revision as of 12:30, 2 February 2016
Contents
Kernel RHEL5 stable 028stab120.1
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
--SergeyB (talk) 07:30, 2 February 2016 (EST)
Kernel RHEL5 testing 028stab120.1
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
--SergeyB (talk) 04:30, 25 January 2016 (EST)
Kernel RHEL5 stable 028stab119.6
- Improved accounting for network-related memory objects (PCLIN-32553)
- Introduced a per-container limit for the number of mounts (PCLIN-32554)
- Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555)
--SergeyB (talk) 09:25, 3 January 2016 (EST)