Changes

Jump to: navigation, search

Download/kernel/rhel4/023stab046.2/changes

117 bytes added, 18:28, 22 October 2009
m
Protected "Download/kernel/rhel4/023stab046.2/changes": Robot: Protecting a list of files. [edit=autoconfirmed:move=autoconfirmed]
Same as [[Download/kernel/rhel4/023stab044.11|023stab044.11]] plus:
* Added:
** +<code>CONFIG_QLA_IOCTLMOD=m</code>** +<code>CONFIG_SCSI_QLA6312=m</code>** +<code>CONFIG_SCSI_QLA24XX=m</code>** +<code>CONFIG_PATA_PDC2027X=m</code>** +<code>CONFIG_PATA_JMICRON=m</code>** +<code>CONFIG_E1000E=m</code>** +<code>CONFIG_IGB=m</code>** +<code>CONFIG_CHELSIO_T3=m</code>** +<code>CONFIG_NETXEN_NIC=m</code>
* Removed:
** -<code>CONFIG_SCSI_QLA2XXX_FAILOVER=y</code><includeonly>[[{{PAGENAME}}/changes#Update description|{{Long changelog message}}]]</includeonly><noinclude>=== Update description ===
=== Update description ===<includeonly>[[{{PAGENAME}}/changes|Read more...]]</includeonly><noinclude>'''The updated kernel includes fixes for the following securityvulnerabilities:'''
* A memory leak in the Red Hat Content Accelerator kernel patch in both the Linux Red Hat and OpenVZ kernels allows local users to cause a denial of service (memory exhaustion) via a large number of open requests involving O_ATOMICLOOKUP (CVE-2007-5494).
'''The updated kernel includes fixes for the following issues:'''
 
* ext3 may become corrupted due to the presence of bad inodes in the orphan list. The following message may accompany the corruption:
:<pre class="simple"code>EXT3-fs warning (device sda6): ext3_unlink: Deleting nonexistent file (37901290), 0.Inode 00000101a15b7840: orphan list check failed!</precode>
* [CIFS]: A memory corruption due to bad error handling in the cifs code may cause an unexpected system behavior. The following message may accompany the memory corruption:
:<pre class="simple"code>CIFS VFS: Invalid size SMB length 4 pdu_length 4</precode>* Reducing the number of CPUs to be available to a VE using the "-- cpus" option of the "vzctl set" command may cause a system crash.
* [CPT]: In kernels with the 4GB split technology enabled (x86 architecture, enterprise kernel), online migration may fail due to a bug in the kernel/userspace segmentation handling in the CPT restoration code.
* [CPT]: Under certain circumstances, /proc is considered as an external mount point, which causes online migration to fail.
* The network does not operate if network interfaces are configured in the 802.3ad bonding mode.
* [ext3]: A non-destructive assertion accomplishes with the following message:
:<pre class="simple"code>Assertion failure in log_do_checkpoint() at fs/jbd/checkpoint.c:363:"drop_count != 0 || cleanup_ret != 0"</precode>
* A kernel memory leak in the IPC code may occur due to a mistake in managing already locked segments in both the Linux Red Hat and OpenVZ kernels.
* A user beancounter (UB) reference leak may occur causing the UB information to remain in /proc/user_beancounters after a VE is stopped.
'''The updated kernel includes a number of updated drivers:'''
* HP Controller SA5xxx SA6xxx driver(cciss driver 2.6.16.RH1 version)* Universal TUN/TAP device driver(tun driver 1.6 version)
'''Besides, the new kernel includes the following improvements:'''
* [CPT]: vzmigrate error messages have been made more verbose.
==== Bugs fixed ====
'''The following bugs from the previous release have been fixed in the new

Navigation menu