Thanks Jerry - your feedback is appreciated and very helpful.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Jerry
Sent: Thursday, December 16, 2010 2:23 PM
To: [email protected]
Subject: Re: [rhelv5-list] Ksplice in production from RHEL4 and RHEL5

On the PSP issue, I just kspliced a machine running the PSP and didn't have a 
problem, it must have been the 32-bit particular splice that was causing my 
issue.

[r...@xxxxxx ~]$ uptrack-upgrade
The following steps will be taken:
Install [zbqjrovf] Clear garbage data on the kernel stack when handling signals.
Install [9f75ze2p] CVE-2010-2798: Denial of service in GFS2.
Install [debtogj3] CVE-2010-2492: Privilege Escalation in eCryptfs.
Install [slpsajun] Improved fix to CVE-2010-1173.
Install [icipqv33] CVE-2010-3015: Integer overflow in ext4 filesystem.
Install [1i77ni8d] CVE-2010-1083: Information leak in USB implementation.
Install [6hvtrm0a] CVE-2010-2942: Information leaks in traffic control dump 
structures.
Install [9e2lkdnh] CVE-2010-3904: Local privilege escalation vulnerability in 
RDS sockets.
Install [xtmd7xa3] CVE-2010-3066: NULL pointer dereference in io_submit_one.
Install [233xar0j] CVE-2010-3067: Information leak in sys_io_submit.
Install [hpuu5lq6] CVE-2010-3078: Information leak in xfs_ioc_fsgetxattr.
Install [dr8cwgcv] CVE-2010-3086: Denial of Service in futex atomic operations.
Install [tclfhccp] CVE-2010-3477: Information leak in tcf_act_police_dump.
Install [bkxfwcl8] CVE-2010-2963: Kernel memory overwrite in VIDIOCSMICROCODE.
Install [5rwbn1n7] Buffer overflow in icmpmsg_put.

Go ahead [y/N]? y
Installing [zbqjrovf] Clear garbage data on the kernel stack when handling 
signals.
Installing [9f75ze2p] CVE-2010-2798: Denial of service in GFS2.
Installing [debtogj3] CVE-2010-2492: Privilege Escalation in eCryptfs.
Installing [slpsajun] Improved fix to CVE-2010-1173.
Installing [icipqv33] CVE-2010-3015: Integer overflow in ext4 filesystem.
Installing [1i77ni8d] CVE-2010-1083: Information leak in USB implementation.
Installing [6hvtrm0a] CVE-2010-2942: Information leaks in traffic control dump 
structures.
Installing [9e2lkdnh] CVE-2010-3904: Local privilege escalation vulnerability 
in RDS sockets.
Installing [xtmd7xa3] CVE-2010-3066: NULL pointer dereference in io_submit_one.
Installing [233xar0j] CVE-2010-3067: Information leak in sys_io_submit.
Installing [hpuu5lq6] CVE-2010-3078: Information leak in xfs_ioc_fsgetxattr.
Installing [dr8cwgcv] CVE-2010-3086: Denial of Service in futex atomic 
operations.
Installing [tclfhccp] CVE-2010-3477: Information leak in tcf_act_police_dump.
Installing [bkxfwcl8] CVE-2010-2963: Kernel memory overwrite in 
VIDIOCSMICROCODE.
Installing [5rwbn1n7] Buffer overflow in icmpmsg_put.
Your kernel is fully up to date.
[r...@xxxxxx  ~]$ uptrack-upgrade
Nothing to be done.


You can see I have the ipmi drivers still loaded

[r...@xxxxx~]$ /etc/init.d/hp-health status
  Using Proliant High Performance
        IPMI based System Health Monitor


hp-OpenIPMI Status:
Module                  Size  Used by
ipmi_si                78156  2
ipmi_devintf           44944  4
ipmi_msghandler        73560  2 ipmi_si,ipmi_devintf

  (hpasmxld) is running...                                 [  OK  ]



      

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list



_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to