594
edits
Changes
→042stab128.2
== Changes ==
Since {{kernel link|rhel6|042stab127.2}}:
* Rebase to RHEL6u9 kernel 2.6.32-696.23.1.el6
* The kernel was recompiled by the updated gcc with retpolines support. Retpolines are a technique used by the kernel to reduce overhead of mitigating Spectre Variant 2 attacks described in CVE-2017-5715.
* [Moderate] The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. (CVE-2017-18017)
* [Moderate] In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size() function in 'net/rds/rdma.c') and thus to a system panic. (CVE-2018-5332)
* [Moderate] The rds_cmsg_atomic() function in 'net/rds/rdma.c' mishandles cases where page pinning fails or an invalid address is supplied by a user. This can lead to a NULL pointer dereference in rds_atomic_free_op() and thus to a system panic. (CVE-2018-5333)
* Fixed compilation warning in ip_map_cached_get(). (PSBM-80063)
* nfs server kernel thread running on host was crashed in vzquota_dparent_check_same(). (PSBM-80879)
* Minor ploop improvements. (PSBM-81964)
* Reverted Red Hat patch "mm: don't return 0 too early from find_get_pages()" included into 2.6.32-696.22.1.el6 kernel. Under certain circumstances this patch caused node to hang because endless cycle in find_get_pages(). (PSBM-82508)
=== See also ===
* {{RHSA|2018-0169}}
* {{RHSA|2018-0512}}
* {{RHBA|2018-0513}} (updated gcc)
* {{CVE|2017-18017}}
* {{CVE|2018-5332}}
* {{CVE|2018-5333}}
* https://access.redhat.com/solutions/3390081
Since {{kernel link|rhel6|042stab127.2}}:
* Rebase to RHEL6u9 kernel 2.6.32-696.23.1.el6
* The kernel was recompiled by the updated gcc with retpolines support. Retpolines are a technique used by the kernel to reduce overhead of mitigating Spectre Variant 2 attacks described in CVE-2017-5715.
* [Moderate] The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. (CVE-2017-18017)
* [Moderate] In the Linux kernel through 4.14.13, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size() function in 'net/rds/rdma.c') and thus to a system panic. (CVE-2018-5332)
* [Moderate] The rds_cmsg_atomic() function in 'net/rds/rdma.c' mishandles cases where page pinning fails or an invalid address is supplied by a user. This can lead to a NULL pointer dereference in rds_atomic_free_op() and thus to a system panic. (CVE-2018-5333)
* Fixed compilation warning in ip_map_cached_get(). (PSBM-80063)
* nfs server kernel thread running on host was crashed in vzquota_dparent_check_same(). (PSBM-80879)
* Minor ploop improvements. (PSBM-81964)
* Reverted Red Hat patch "mm: don't return 0 too early from find_get_pages()" included into 2.6.32-696.22.1.el6 kernel. Under certain circumstances this patch caused node to hang because endless cycle in find_get_pages(). (PSBM-82508)
=== See also ===
* {{RHSA|2018-0169}}
* {{RHSA|2018-0512}}
* {{RHBA|2018-0513}} (updated gcc)
* {{CVE|2017-18017}}
* {{CVE|2018-5332}}
* {{CVE|2018-5333}}
* https://access.redhat.com/solutions/3390081