Difference between revisions of "News/updates"
< News
(add latest kernel to fill rss feed) |
(028stab120.1 to -testing) |
||
Line 23: | Line 23: | ||
<!-- *DO NOT REMOVE THIS LINE* new news should go here --> | <!-- *DO NOT REMOVE THIS LINE* new news should go here --> | ||
+ | == Kernel RHEL5 testing 028stab120.1 == | ||
+ | |||
+ | * Rebase to RHEL5 kernel 2.6.32-408.el5 | ||
+ | * A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366) | ||
+ | |||
+ | {{Download link|kernel/rhel5-testing/028stab120.1}} | ||
+ | |||
+ | --[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 04:30, 25 January 2016 (EST) | ||
== Kernel RHEL5 028stab119.6 == | == Kernel RHEL5 028stab119.6 == | ||
Revision as of 09:30, 25 January 2016
Kernel RHEL5 testing 028stab120.1
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
--SergeyB (talk) 04:30, 25 January 2016 (EST)
Kernel RHEL5 028stab119.6
- Improved accounting for network-related memory objects (PCLIN-32553)
- Introduced a per-container limit for the number of mounts (PCLIN-32554)
- Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555)
--SergeyB (talk) 09:25, 3 January 2016 (EST)