Difference between revisions of "Download/kernel/rhel6/042stab128.2/changes"
< Download | kernel | rhel6 | 042stab128.2
(→042stab128.2) |
(→Changes) |
||
Line 10: | Line 10: | ||
* nfs server kernel thread running on host was crashed in vzquota_dparent_check_same(). (PSBM-80879) | * nfs server kernel thread running on host was crashed in vzquota_dparent_check_same(). (PSBM-80879) | ||
* Minor ploop improvements. (PSBM-81964) | * Minor ploop improvements. (PSBM-81964) | ||
− | * Reverted Red Hat patch "mm: don't return 0 too early from find_get_pages()" included into 2.6.32-696.22.1.el6 kernel. Under certain circumstances this patch caused node to hang because endless cycle in find_get_pages(). (PSBM-82508) | + | * Reverted Red Hat patch "mm: don't return 0 too early from find_get_pages()" included into 2.6.32-696.22.1.el6 kernel. Under certain circumstances this patch caused node to hang because of endless cycle in find_get_pages(). (PSBM-82508) |
=== See also === | === See also === |
Latest revision as of 09:32, 26 March 2018
Changes[edit]
Since 042stab127.2:
- Rebase to RHEL6u9 kernel 2.6.32-696.23.1.el6
- The kernel was recompiled by the updated gcc with retpolines support. Retpolines are a technique used by the kernel to reduce overhead of mitigating Spectre Variant 2 attacks described in CVE-2017-5715.
- [Moderate] The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. (CVE-2017-18017)
- [Moderate] In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size() function in 'net/rds/rdma.c') and thus to a system panic. (CVE-2018-5332)
- [Moderate] The rds_cmsg_atomic() function in 'net/rds/rdma.c' mishandles cases where page pinning fails or an invalid address is supplied by a user. This can lead to a NULL pointer dereference in rds_atomic_free_op() and thus to a system panic. (CVE-2018-5333)
- Fixed compilation warning in ip_map_cached_get(). (PSBM-80063)
- nfs server kernel thread running on host was crashed in vzquota_dparent_check_same(). (PSBM-80879)
- Minor ploop improvements. (PSBM-81964)
- Reverted Red Hat patch "mm: don't return 0 too early from find_get_pages()" included into 2.6.32-696.22.1.el6 kernel. Under certain circumstances this patch caused node to hang because of endless cycle in find_get_pages(). (PSBM-82508)