From 74c370f2d865fa2a62212247f8bbabe14dfec719 Mon Sep 17 00:00:00 2001
From: yangsheng <yangsheng>
Date: Mon, 8 Oct 2007 08:13:24 +0000
Subject: [PATCH] Branch HEAD b=13751 i=shadow i=johann

Update target & which_patch file for RHEL5 2.6.18-8.1.14.el5.
---
 lustre/ChangeLog                                  | 13 ++++++++++++-
 lustre/kernel_patches/targets/2.6-rhel5.target.in |  2 +-
 lustre/kernel_patches/which_patch                 |  2 +-
 3 files changed, 14 insertions(+), 3 deletions(-)

diff --git a/lustre/ChangeLog b/lustre/ChangeLog
index 7faba054df..86ffc43ae2 100644
--- a/lustre/ChangeLog
+++ b/lustre/ChangeLog
@@ -3,7 +3,7 @@
         2.6.5-7.286 (SLES 9),
         2.6.9-55.0.6.EL (RHEL 4),
         2.6.16.46-0.14 (SLES 10),
-        2.6.18-8.1.10.EL5 (RHEL 5).
+        2.6.18-8.1.14.EL5 (RHEL 5).
         2.6.18.8 vanilla (kernel.org)
        * Client support for unpatched kernels:
         (see http://wiki.lustre.org/index.php?title=Patchless_Client)
@@ -357,6 +357,17 @@ Details    : if request processig with error which can be recoverable on server
              request should be resend, otherwise page released from cache and
              marked as error.
 
+Severity   : critical
+Bugzilla   : 13751
+Description: Kernel patches update for RHEL5 2.6.18-8.1.14.el5.
+Details    : Modify target file & which_patch.
+             A flaw was found in the IA32 system call emulation provided 
+             on AMD64 and Intel 64 platforms. An improperly validated 64-bit 
+             value could be stored in the %RAX register, which could trigger an 
+             out-of-bounds system call table access. An untrusted local user 
+             could exploit this flaw to run code in the kernel 
+             (ie a root privilege escalation). (CVE-2007-4573). 
+
 --------------------------------------------------------------------------------
 
 2007-08-10         Cluster File Systems, Inc. <info@clusterfs.com>
diff --git a/lustre/kernel_patches/targets/2.6-rhel5.target.in b/lustre/kernel_patches/targets/2.6-rhel5.target.in
index d8ece8d0b4..eceac159d1 100644
--- a/lustre/kernel_patches/targets/2.6-rhel5.target.in
+++ b/lustre/kernel_patches/targets/2.6-rhel5.target.in
@@ -1,5 +1,5 @@
 lnxmaj="2.6.18"
-lnxrel="8.1.10.el5"
+lnxrel="8.1.14.el5"
 
 KERNEL=linux-${lnxmaj}-${lnxrel}.tar.bz2
 SERIES=2.6-rhel5.series
diff --git a/lustre/kernel_patches/which_patch b/lustre/kernel_patches/which_patch
index edbe77d064..73a5166474 100644
--- a/lustre/kernel_patches/which_patch
+++ b/lustre/kernel_patches/which_patch
@@ -5,7 +5,7 @@ SUPPORTED KERNELS:
 2.6-suse-newer        SLES9: 2.6.5-7.286       extra patches for SLES9 after SP1
 2.6-rhel4             RHEL4: 2.6.9-55.0.6.EL
 2.6-sles10            SLES10: 2.6.16.46-0.14
-2.6-rhel5.series      RHEL5: 2.6.18-8.1.10.el5
+2.6-rhel5.series      RHEL5: 2.6.18-8.1.14.el5
 2.6.18-vanilla.series kernel.org: 2.6.18.8
 
 CLIENT SUPPORT FOR UNPATCHED KERNELS:
-- 
GitLab