From 2137e7e0864b61c5a3a46762133e104754b926f2 Mon Sep 17 00:00:00 2001
From: yangsheng <yangsheng>
Date: Mon, 8 Oct 2007 08:05:04 +0000
Subject: [PATCH] Branch b1_6 b=13751 i=shadow i=johann

Update target & which_patch file for RHEL5 2.6.18-8.1.14.el5.
---
 lustre/ChangeLog                                  | 13 ++++++++++++-
 lustre/kernel_patches/targets/2.6-rhel5.target.in |  2 +-
 lustre/kernel_patches/which_patch                 |  2 +-
 3 files changed, 14 insertions(+), 3 deletions(-)

diff --git a/lustre/ChangeLog b/lustre/ChangeLog
index d4cca12afd..86b26dd8f2 100644
--- a/lustre/ChangeLog
+++ b/lustre/ChangeLog
@@ -4,7 +4,7 @@ tbd         Cluster File Systems, Inc. <info@clusterfs.com>
         2.6.5-7.286 (SLES 9),
         2.6.9-55.0.6.EL (RHEL 4),
         2.6.16.46-0.14 (SLES 10),
-        2.6.18-8.1.10.el5 (RHEL 5),
+        2.6.18-8.1.14.el5 (RHEL 5),
         2.6.18.8 vanilla (kernel.org)
        * Client support for unpatched kernels:
         (see http://wiki.lustre.org/index.php?title=Patchless_Client)
@@ -109,6 +109,17 @@ Details    : if request processig with error which can be recoverable on server
              request should be resend, otherwise page released from cache and
              marked as error.
 
+Severity   : critical
+Bugzilla   : 13751
+Description: Kernel patches update for RHEL5 2.6.18-8.1.14.el5.
+Details    : Modify target file & which_patch.
+             A flaw was found in the IA32 system call emulation provided 
+             on AMD64 and Intel 64 platforms. An improperly validated 64-bit 
+             value could be stored in the %RAX register, which could trigger an 
+             out-of-bounds system call table access. An untrusted local user 
+             could exploit this flaw to run code in the kernel 
+             (ie a root privilege escalation). (CVE-2007-4573). 
+
 --------------------------------------------------------------------------------
 
 2007-09-27         Cluster File Systems, Inc. <info@clusterfs.com>
diff --git a/lustre/kernel_patches/targets/2.6-rhel5.target.in b/lustre/kernel_patches/targets/2.6-rhel5.target.in
index d8ece8d0b4..eceac159d1 100644
--- a/lustre/kernel_patches/targets/2.6-rhel5.target.in
+++ b/lustre/kernel_patches/targets/2.6-rhel5.target.in
@@ -1,5 +1,5 @@
 lnxmaj="2.6.18"
-lnxrel="8.1.10.el5"
+lnxrel="8.1.14.el5"
 
 KERNEL=linux-${lnxmaj}-${lnxrel}.tar.bz2
 SERIES=2.6-rhel5.series
diff --git a/lustre/kernel_patches/which_patch b/lustre/kernel_patches/which_patch
index edbe77d064..73a5166474 100644
--- a/lustre/kernel_patches/which_patch
+++ b/lustre/kernel_patches/which_patch
@@ -5,7 +5,7 @@ SUPPORTED KERNELS:
 2.6-suse-newer        SLES9: 2.6.5-7.286       extra patches for SLES9 after SP1
 2.6-rhel4             RHEL4: 2.6.9-55.0.6.EL
 2.6-sles10            SLES10: 2.6.16.46-0.14
-2.6-rhel5.series      RHEL5: 2.6.18-8.1.10.el5
+2.6-rhel5.series      RHEL5: 2.6.18-8.1.14.el5
 2.6.18-vanilla.series kernel.org: 2.6.18.8
 
 CLIENT SUPPORT FOR UNPATCHED KERNELS:
-- 
GitLab