xerces-j2
277
• Support for assigning more than 12 SR-IOV Virtual Functions (VFs) to a single fully virtualized Xen
guest. (
BZ#511403
2179
)
• Support for BZIP2 and LZMA compressed kernels for para-virtualized guests. (
BZ#517049
2180
)
• PCIe switches allow peer to peer transactions that are routed by the switch and could bypass the
Intel VT-d translation hardware, potentially causing unexpected behavior in the system. Access
Control Services (ACS) allows the system to force the PCIe switch to route all traffic upstream so
that the VT-d hardware can validate all transactions. The updated package prevents assigning PCI
devices below a non-ACS PCIe switch. (
BZ#523819
2181
)
• Support for using the EXT4 file system for a boot partition for para-virtualized guests.
(
BZ#524611
2182
)
• SMBIOS now complies with the Microsoft Server Virtualization Validation Program (SVVP).
(
BZ#540161
2183
)
• Xen now automatically pins guests to a smallest possible number of NUMA nodes. This provides
better performance on NUMA based systems. (
BZ#543199
2184
)
Users of xen are advised to upgrade to these updated packages, which resolve these issues and add
these enhancements.
1.218. xerces-j2
1.218.1. RHSA-2009:1615: Moderate security update
Important
This update has already been released (prior to the GA of this release) as the security
errata
RHSA-2009:1615
2185
Updated xerces-j2 packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response
Team.
The xerces-j2 packages provide the Apache Xerces2 Java Parser, a high-performance XML parser. A
Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for
certain types of files, such as XML files.
A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier
in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an
application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang
due to excessive CPU use). (
CVE-2009-2625
2186
)
Users should upgrade to these updated packages, which contain a backported patch to correct this
issue. Applications using the Apache Xerces2 Java Parser must be restarted for this update to take
effect.
2186
https://www.redhat.com/security/data/cve/CVE-2009-2625.html
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...