Details
-
Bug
-
Resolution: Fixed
-
Minor
-
None
-
None
-
3
-
9223372036854775807
Description
- When a transparent proxy application was running and the number of established
connections on the computer exceeded one million, unrelated processes, such as
curl or ssh, were unable to bind to a local IP on the box to initiate a
connection. The provided patch fixes the cooperation of the
REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being
exhausted. As a result, the aforementioned bug no longer occurs in the described
scenario. (BZ#1333571)
- Previously, packets including the Common IP Security Option (CIPSO) label tag
type 5 with certain category ranges were not read correctly. As a consequence,
these packets were interpreted with the fallback security label. The provided
patch fixes the netlbl_secattr_catmap_setrng() function, and thus fixes this
bug. (BZ#1333579)
- When hot removing or adding devices from a RAID1 array, the raid1d
daemon could deadlock and become unresponsive in the freeze_array() function.
The provided patch includes bio_end_io_list writes in the nr_queued variable to
prevent the aforementioned hang from occurring. (BZ#1333576)
Attachments
Issue Links
- is blocked by
-
LU-8126 new kernel [RHEL6.8 2.6.32-642.el6]
- Resolved