News/updates
< NewsRevision as of 12:30, 2 February 2016 by Sergey Bronnikov (talk | contribs) (028stab120.1 to -stable)
Contents
Kernel RHEL5 stable 028stab120.1
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
Kernel RHEL5 testing 028stab120.1
- Rebase to RHEL5 kernel 2.6.32-408.el5
- A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
Kernel RHEL5 stable 028stab119.6
- Improved accounting for network-related memory objects (PCLIN-32553)
- Introduced a per-container limit for the number of mounts (PCLIN-32554)
- Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555)
--SergeyB (talk) 09:25, 3 January 2016 (EST)