Editing Download/kernel/rhel6/042stab144.1/changes
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
* Rebase to RHEL6u10 kernel 2.6.32-754.29.2.el6 | * Rebase to RHEL6u10 kernel 2.6.32-754.29.2.el6 | ||
+ | * '''[Important]''' Kernel: KVM: OOB memory access via mmio ring buffer. (CVE-2019-14821) | ||
+ | * vzfs-to-ploop conversion on running container could crash the host. (PSBM-99030, PSBM-100878) | ||
+ | * Container stop operation could hang. (PSBM-100203) | ||
+ | * Container restore operation could crash the host due to incorrect symbolic link processing. (OVZ-7147) | ||
+ | |||
* '''Important''' Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic. (CVE-2020-10711) | * '''Important''' Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic. (CVE-2020-10711) | ||
* '''Important''' kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow. (CVE-2019-17666) | * '''Important''' kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow. (CVE-2019-17666) |