Difference between revisions of "News/updates"

From OpenVZ Virtuozzo Containers Wiki
Jump to: navigation, search
(028stab120.1 to -testing)
(028stab120.1 to -stable)
Line 23: Line 23:
 
<!-- *DO NOT REMOVE THIS LINE* new news should go here -->
 
<!-- *DO NOT REMOVE THIS LINE* new news should go here -->
  
 +
== Kernel RHEL5 stable 028stab120.1 ==
 +
 +
* Rebase to RHEL5 kernel 2.6.32-408.el5
 +
* A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
 +
 +
{{Download link|kernel/rhel5/028stab120.1}}
 +
 +
--[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 07:30, 2 February 2016 (EST)
 
== Kernel RHEL5 testing 028stab120.1 ==
 
== Kernel RHEL5 testing 028stab120.1 ==
  
Line 31: Line 39:
  
 
--[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 04:30, 25 January 2016 (EST)
 
--[[User:Sergey Bronnikov|SergeyB]] ([[User talk:Sergey Bronnikov|talk]]) 04:30, 25 January 2016 (EST)
== Kernel RHEL5 028stab119.6 ==
+
 
 +
== Kernel RHEL5 stable 028stab119.6 ==
  
 
* Improved accounting for network-related memory objects (PCLIN-32553)
 
* Improved accounting for network-related memory objects (PCLIN-32553)

Revision as of 12:30, 2 February 2016


Kernel RHEL5 stable 028stab120.1

  • Rebase to RHEL5 kernel 2.6.32-408.el5
  • A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)

[ Change log/downloads... ]

--SergeyB (talk) 07:30, 2 February 2016 (EST)

Kernel RHEL5 testing 028stab120.1

  • Rebase to RHEL5 kernel 2.6.32-408.el5
  • A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)

[ Change log/downloads... ]

--SergeyB (talk) 04:30, 25 January 2016 (EST)

Kernel RHEL5 stable 028stab119.6

  • Improved accounting for network-related memory objects (PCLIN-32553)
  • Introduced a per-container limit for the number of mounts (PCLIN-32554)
  • Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555)

[ Change log/downloads... ]

--SergeyB (talk) 09:25, 3 January 2016 (EST)

Older updates