System Environment/Kernel

kernel-PAE: The Linux kernel compiled for PAE capable machines.

Name:kernel-PAE Vendor:Scientific Linux
Version:2.6.18 License:GPLv2
Release:92.1.10.el5 URL:http://www.kernel.org/
Summary
This package includes a version of the Linux kernel with support for up to 64GB of high memory. It requires a CPU with Physical Address Extensions (PAE). The non-PAE kernel can only address up to 4GB of memory. Install the kernel-PAE package if your machine has more than 4GB of memory.

Arch: i686

Download:kernel-PAE-2.6.18-92.1.10.el5.i686.rpm
Build Date:Mon Aug 4 13:32:59 2008
Packager:
Size:37.52 MiB

Changelog

* Wed Jul 23 17:00:00 2008 Jiri Pirko <jpirko{%}redhat{*}com> [2.6.18-92.1.10.el5]
- [ia64] softlock: prevent endless warnings in kdump (Neil Horman ) [456117 453200]
* Wed Jul 16 17:00:00 2008 Jiri Pirko <jpirko{%}redhat{*}com> [2.6.18-92.1.9.el5]
- [misc] signaling msgrvc() should not pass back error (Jiri Pirko ) [455278 452533]
- [ia64] properly unregister legacy interrupts (Prarit Bhargava ) [450337 445886]
* Mon Jul 14 17:00:00 2008 Jiri Pirko <jpirko{%}redhat{*}com> [2.6.18-92.1.8.el5]
- [net] randomize udp port allocation (Eugene Teo ) [454571 454572]
- [tty] add NULL pointer checks (Aristeu Rozanski ) [453425 453154] {CVE-2008-2812}
- [net] sctp: make sure sctp_addr does not overflow (David S. Miller ) [452482 452483] {CVE-2008-2826}
- [sys] sys_setrlimit: prevent setting RLIMIT_CPU to 0 (Neil Horman ) [437121 437122] {CVE-2008-1294}
- [net] sit: exploitable remote memory leak (Jiri Pirko ) [446038 446039] {CVE-2008-2136}
- [misc] ttyS1 lost interrupt, stops transmitting v2 (Brian Maly ) [455256 451157]
- [misc] ttyS1 loses interrupt and stops transmitting (Simon McGrath ) [443071 440121]

Listing created by RepoView-0.5.2