Following security bugs are fixed in this errataCVE-2010-3904When copying data to userspace, the RDS protocol failed to verify that the user-provided address was a validuserspace address. A local unprivileged user could issue specially crafted socket calls to write arbitraryvalues into kernel memory and potentially escalate privileges to root.CVE-2010-3067Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allowslocal users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submitsystem call.CVE-2010-3477The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueingfunctionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, whichallows local users to obtain potentially sensitive information from kernel memory via vectors involving a dumpoperation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.kernel:[2.6.32-100.21.1.el5]- [rds] fix access issue with rds (Chris Mason) {CVE-2010-3904}- [fuse] linux-2.6.32-fuse-return-EGAIN-if-not-connected-bug-10154489.patch- [net] linux-2.6.32-net-sched-fix-kernel-leak-in-act_police.patch- [aio] linux-2.6.32-aio-check-for-multiplication-overflow-in-do_io_subm.patchofa:[1.5.1-4.0.23]- Fix rds permissions checks during copies[1.5.1-4.0.21]- Update to BXOFED 1.5.1-1.3.6-5