From 2137e7e0864b61c5a3a46762133e104754b926f2 Mon Sep 17 00:00:00 2001 From: yangsheng <yangsheng> Date: Mon, 8 Oct 2007 08:05:04 +0000 Subject: [PATCH] Branch b1_6 b=13751 i=shadow i=johann Update target & which_patch file for RHEL5 2.6.18-8.1.14.el5. --- lustre/ChangeLog | 13 ++++++++++++- lustre/kernel_patches/targets/2.6-rhel5.target.in | 2 +- lustre/kernel_patches/which_patch | 2 +- 3 files changed, 14 insertions(+), 3 deletions(-) diff --git a/lustre/ChangeLog b/lustre/ChangeLog index d4cca12afd..86b26dd8f2 100644 --- a/lustre/ChangeLog +++ b/lustre/ChangeLog @@ -4,7 +4,7 @@ tbd Cluster File Systems, Inc. <info@clusterfs.com> 2.6.5-7.286 (SLES 9), 2.6.9-55.0.6.EL (RHEL 4), 2.6.16.46-0.14 (SLES 10), - 2.6.18-8.1.10.el5 (RHEL 5), + 2.6.18-8.1.14.el5 (RHEL 5), 2.6.18.8 vanilla (kernel.org) * Client support for unpatched kernels: (see http://wiki.lustre.org/index.php?title=Patchless_Client) @@ -109,6 +109,17 @@ Details : if request processig with error which can be recoverable on server request should be resend, otherwise page released from cache and marked as error. +Severity : critical +Bugzilla : 13751 +Description: Kernel patches update for RHEL5 2.6.18-8.1.14.el5. +Details : Modify target file & which_patch. + A flaw was found in the IA32 system call emulation provided + on AMD64 and Intel 64 platforms. An improperly validated 64-bit + value could be stored in the %RAX register, which could trigger an + out-of-bounds system call table access. An untrusted local user + could exploit this flaw to run code in the kernel + (ie a root privilege escalation). (CVE-2007-4573). + -------------------------------------------------------------------------------- 2007-09-27 Cluster File Systems, Inc. <info@clusterfs.com> diff --git a/lustre/kernel_patches/targets/2.6-rhel5.target.in b/lustre/kernel_patches/targets/2.6-rhel5.target.in index d8ece8d0b4..eceac159d1 100644 --- a/lustre/kernel_patches/targets/2.6-rhel5.target.in +++ b/lustre/kernel_patches/targets/2.6-rhel5.target.in @@ -1,5 +1,5 @@ lnxmaj="2.6.18" -lnxrel="8.1.10.el5" +lnxrel="8.1.14.el5" KERNEL=linux-${lnxmaj}-${lnxrel}.tar.bz2 SERIES=2.6-rhel5.series diff --git a/lustre/kernel_patches/which_patch b/lustre/kernel_patches/which_patch index edbe77d064..73a5166474 100644 --- a/lustre/kernel_patches/which_patch +++ b/lustre/kernel_patches/which_patch @@ -5,7 +5,7 @@ SUPPORTED KERNELS: 2.6-suse-newer SLES9: 2.6.5-7.286 extra patches for SLES9 after SP1 2.6-rhel4 RHEL4: 2.6.9-55.0.6.EL 2.6-sles10 SLES10: 2.6.16.46-0.14 -2.6-rhel5.series RHEL5: 2.6.18-8.1.10.el5 +2.6-rhel5.series RHEL5: 2.6.18-8.1.14.el5 2.6.18-vanilla.series kernel.org: 2.6.18.8 CLIENT SUPPORT FOR UNPATCHED KERNELS: -- GitLab