* Wed Aug 16 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-510.rt7.299.el8] - [rt] build kernel-rt-4.18.0-510.rt7.299.el8 [2180997] - locking: 8.9 KRTS JiraReadiness exercise (John B. Wyatt IV) [RHEL-982] - x86/show_trace_log_lvl: Ensure stack pointer is aligned, again (Oleg Nesterov) [2188093] - ahci: Add support for Dell S140 and later controllers (Tomas Henzl) [2222879] - s390/time: steer clocksource on STP syncs for CLOCK_MONOTONIC (Tobias Huschle) [2177649] - memstick: r592: Fix UAF bug in r592_remove due to race condition (Wander Lairson Costa) [2216152] {CVE-2023-35825} - scsi: zfcp: Defer fc_rport blocking until after ADISC response (Tobias Huschle) [2230241] - RDMA/efa: Add EFA 0xefa2 PCI ID (Izabela Bakollari) [2170086] - RDMA/efa: Support CQ receive entries with source GID (Izabela Bakollari) [2170086] - Revert "isystem: ship and use stdarg.h" (Jocelyn Falempe) [2229185] - drm/drm_print: Use system include for <stdargs.h> (Jocelyn Falempe) [2229185] - x86/mm: Do not shuffle CPU entry areas without KASLR (Rafael Aquini) [2165932] {CVE-2023-0597} - x86/mm: Randomize per-cpu entry area (Rafael Aquini) [2165932] {CVE-2023-0597} - x86/kasan: Map shadow for percpu pages on demand (Rafael Aquini) [2165932] {CVE-2023-0597} - x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise (Rafael Aquini) [2165932] {CVE-2023-0597} Resolves: rhbz#2180997, rhbz#2216152, rhbz#2165932, RHEL-982 Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
10 MiB
10 MiB
The file is too large to be shown.
View Raw