Xerces-J2 - Red Hat ENTERPRISE LINUX 5.5 - TECHNICAL NOTES Manual

Table of Contents

Advertisement

• Support for assigning more than 12 SR-IOV Virtual Functions (VFs) to a single fully virtualized Xen
2179
guest.
(BZ#511403
• Support for BZIP2 and LZMA compressed kernels for para-virtualized guests.
• PCIe switches allow peer to peer transactions that are routed by the switch and could bypass the
Intel VT-d translation hardware, potentially causing unexpected behavior in the system. Access
Control Services (ACS) allows the system to force the PCIe switch to route all traffic upstream so
that the VT-d hardware can validate all transactions. The updated package prevents assigning PCI
devices below a non-ACS PCIe switch.
• Support for using the EXT4 file system for a boot partition for para-virtualized guests.
2182
(BZ#524611
)
• SMBIOS now complies with the Microsoft Server Virtualization Validation Program (SVVP).
2183
(BZ#540161
)
• Xen now automatically pins guests to a smallest possible number of NUMA nodes. This provides
better performance on NUMA based systems.
Users of xen are advised to upgrade to these updated packages, which resolve these issues and add
these enhancements.

1.218. xerces-j2

1.218.1. RHSA-2009:1615: Moderate security update
Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2009:1615
errata
Updated xerces-j2 packages that fix a security issue are now available for Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red Hat Security Response
Team.
The xerces-j2 packages provide the Apache Xerces2 Java Parser, a high-performance XML parser. A
Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for
certain types of files, such as XML files.
A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier
in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an
application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang
due to excessive CPU use).
Users should upgrade to these updated packages, which contain a backported patch to correct this
issue. Applications using the Apache Xerces2 Java Parser must be restarted for this update to take
effect.
2186
https://www.redhat.com/security/data/cve/CVE-2009-2625.html
)
(BZ#523819
2185
2186
(CVE-2009-2625
2181
)
2184
(BZ#543199
)
)
xerces-j2
2180
(BZ#517049
)
277

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise linux 5.5

Table of Contents