kernel-rt-4.18.0-553.66.1.rt7.407.el8_10
* Mon Jul 28 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.66.1.rt7.407.el8_10]
- [rt] build kernel-rt-4.18.0-553.66.1.rt7.407.el8_10
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (Xin Long) [RHEL-105415] {CVE-2025-38001}
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (Xin Long) [RHEL-105415] {CVE-2025-38000}
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CKI Backport Bot) [RHEL-105415] {CVE-2025-37890}
- sch_hfsc: make hfsc_qlen_notify() idempotent (Xin Long) [RHEL-105415]
- crypto: algif_hash - fix double free in hash_accept (CKI Backport Bot) [RHEL-102223] {CVE-2025-38079}
- Revert "smb: client: fix TCP timers deadlock after rmmod" (Paulo Alcantara) [RHEL-100698] {CVE-2025-22077}
- Revert "smb: client: Fix netns refcount imbalance causing leaks and use-after-free" (Paulo Alcantara) [RHEL-100698]
- smb: client: Fix netns refcount imbalance causing leaks and use-after-free (Paulo Alcantara) [RHEL-100698]
- smb: client: fix TCP timers deadlock after rmmod (Paulo Alcantara) [RHEL-100698] {CVE-2024-54680}
- smb: client: Fix use-after-free of network namespace. (Paulo Alcantara) [RHEL-100698] {CVE-2024-53095}
- smb: client: fix warning in generic_ip_connect() (Paulo Alcantara) [RHEL-100698]
- net: tipc: fix refcount warning in tipc_aead_encrypt (Xin Long) [RHEL-103079]
- net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CKI Backport Bot) [RHEL-103079] {CVE-2025-38052}
- memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CKI Backport Bot) [RHEL-99013] {CVE-2025-22020}
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CKI Backport Bot) [RHEL-98837] {CVE-2025-21928}
Resolves: RHEL-100698, RHEL-102223, RHEL-103079, RHEL-105415, RHEL-98837, RHEL-99013
Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
This commit is contained in:
parent
273fc7b293
commit
b8318da598
24
kernel.spec
24
kernel.spec
@ -38,10 +38,10 @@
|
||||
# define buildid .local
|
||||
|
||||
%define specversion 4.18.0
|
||||
%define pkgrelease 553.65.1.rt7.406.el8_10
|
||||
%define pkgrelease 553.66.1.rt7.407.el8_10
|
||||
|
||||
# allow pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 553.65.1.rt7.406%{?dist}
|
||||
%define specrelease 553.66.1.rt7.407%{?dist}
|
||||
|
||||
%define pkg_release %{specrelease}%{?buildid}
|
||||
|
||||
@ -148,7 +148,7 @@
|
||||
# The preempt RT patch level
|
||||
%global rttag .rt7
|
||||
# realtimeN
|
||||
%global rtbuild .406
|
||||
%global rtbuild .407
|
||||
%define with_doc 0
|
||||
%define with_headers 0
|
||||
%define with_cross_headers 0
|
||||
@ -2708,6 +2708,24 @@ fi
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Mon Jul 28 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.66.1.rt7.407.el8_10]
|
||||
- [rt] build kernel-rt-4.18.0-553.66.1.rt7.407.el8_10
|
||||
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (Xin Long) [RHEL-105415] {CVE-2025-38001}
|
||||
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (Xin Long) [RHEL-105415] {CVE-2025-38000}
|
||||
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CKI Backport Bot) [RHEL-105415] {CVE-2025-37890}
|
||||
- sch_hfsc: make hfsc_qlen_notify() idempotent (Xin Long) [RHEL-105415]
|
||||
- crypto: algif_hash - fix double free in hash_accept (CKI Backport Bot) [RHEL-102223] {CVE-2025-38079}
|
||||
- Revert "smb: client: fix TCP timers deadlock after rmmod" (Paulo Alcantara) [RHEL-100698] {CVE-2025-22077}
|
||||
- Revert "smb: client: Fix netns refcount imbalance causing leaks and use-after-free" (Paulo Alcantara) [RHEL-100698]
|
||||
- smb: client: Fix netns refcount imbalance causing leaks and use-after-free (Paulo Alcantara) [RHEL-100698]
|
||||
- smb: client: fix TCP timers deadlock after rmmod (Paulo Alcantara) [RHEL-100698] {CVE-2024-54680}
|
||||
- smb: client: Fix use-after-free of network namespace. (Paulo Alcantara) [RHEL-100698] {CVE-2024-53095}
|
||||
- smb: client: fix warning in generic_ip_connect() (Paulo Alcantara) [RHEL-100698]
|
||||
- net: tipc: fix refcount warning in tipc_aead_encrypt (Xin Long) [RHEL-103079]
|
||||
- net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CKI Backport Bot) [RHEL-103079] {CVE-2025-38052}
|
||||
- memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CKI Backport Bot) [RHEL-99013] {CVE-2025-22020}
|
||||
- HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CKI Backport Bot) [RHEL-98837] {CVE-2025-21928}
|
||||
|
||||
* Thu Jul 24 2025 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.65.1.rt7.406.el8_10]
|
||||
- [rt] build kernel-rt-4.18.0-553.65.1.rt7.406.el8_10
|
||||
- x86/alternatives: avoid mapping FIX_TEXT_POKE1 page when it is not required (Rafael Aquini) [RHEL-95422]
|
||||
|
||||
2
sources
2
sources
@ -1 +1 @@
|
||||
SHA512 (linux-4.18.0-553.65.1.rt7.406.el8_10.tar.xz) = 6f7b78fe2c4f1a89387681b56bdab10652ba604fa12d01f89963a668cf8bad5e94a12beb8f6fcabbc3ea0685e603a15c97b87dea03cd61f2787140305df73119
|
||||
SHA512 (linux-4.18.0-553.66.1.rt7.407.el8_10.tar.xz) = a13caace132516a42d671a265b1665413f876bf891e40ccead43bb90c818af22684c150d2ecbdff55d1255a96375fd283ffe5f9fc6d57030c93b575df4867518
|
||||
|
||||
Loading…
Reference in New Issue
Block a user