kernel-5.14.0-362.el9
* Mon Aug 28 2023 Jan Stancek <jstancek@redhat.com> [5.14.0-362.el9] - smb: client: fix null auth (Scott Mayhew) [2223247] - ice: Fix NULL pointer deref during VF reset (Petr Oros) [2217304] - gfs2: conversion deadlock do_promote bypass (Bob Peterson) [2226861] - gfs2: do_promote cleanup (Andreas Gruenbacher) [2226861] - scsi: lpfc: Remove reftag check in DIF paths (Paul Ely) [2227947] - scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (Paul Ely) [2227947] - scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (Paul Ely) [2227947] - scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (Paul Ely) [2227947] - scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (Paul Ely) [2227947] - scsi: lpfc: Qualify ndlp discovery state when processing RSCN (Paul Ely) [2227947] - ext4: drop dio overwrite only flag and associated warning (Brian Foster) [2228056] - sched/core: Add __always_inline to schedule_loop() (Crystal Wood) [2232098] - net: openvswitch: add misc error drop reasons (Adrian Moreno) [2232283] - net: openvswitch: add meter drop reason (Adrian Moreno) [2232283] - net: openvswitch: add explicit drop action (Adrian Moreno) [2232283] - net: openvswitch: add action error drop reason (Adrian Moreno) [2232283] - net: openvswitch: add last-action drop reason (Adrian Moreno) [2232283] - net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128} - net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128} - net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128} - x86/kasan: Populate shadow for shared chunk of the CPU entry area (Rafael Aquini) [2233699] - x86/kasan: Add helpers to align shadow addresses up and down (Rafael Aquini) [2233699] - x86/kasan: Rename local CPU_ENTRY_AREA variables to shorten names (Rafael Aquini) [2233699] - x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area (Rafael Aquini) [2233699] - x86/mm: Recompute physical address for every page of per-CPU CEA mapping (Rafael Aquini) [2233699] Resolves: rhbz#2217304, rhbz#2223247, rhbz#2225513, rhbz#2226861, rhbz#2227947, rhbz#2228056, rhbz#2232098, rhbz#2232283, rhbz#2233699 Signed-off-by: Jan Stancek <jstancek@redhat.com>
This commit is contained in:
parent
b271916051
commit
45dfac6548
@ -12,7 +12,7 @@ RHEL_MINOR = 3
|
||||
#
|
||||
# Use this spot to avoid future merge conflicts.
|
||||
# Do not trim this comment.
|
||||
RHEL_RELEASE = 361
|
||||
RHEL_RELEASE = 362
|
||||
|
||||
#
|
||||
# ZSTREAM
|
||||
|
35
kernel.spec
35
kernel.spec
@ -161,15 +161,15 @@ Summary: The Linux kernel
|
||||
# define buildid .local
|
||||
%define specversion 5.14.0
|
||||
%define patchversion 5.14
|
||||
%define pkgrelease 361
|
||||
%define pkgrelease 362
|
||||
%define kversion 5
|
||||
%define tarfile_release 5.14.0-361.el9
|
||||
%define tarfile_release 5.14.0-362.el9
|
||||
# This is needed to do merge window version magic
|
||||
%define patchlevel 14
|
||||
# This allows pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 361%{?buildid}%{?dist}
|
||||
%define specrelease 362%{?buildid}%{?dist}
|
||||
# This defines the kabi tarball version
|
||||
%define kabiversion 5.14.0-361.el9
|
||||
%define kabiversion 5.14.0-362.el9
|
||||
|
||||
#
|
||||
# End of genspec.sh variables
|
||||
@ -3755,6 +3755,33 @@ fi
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Mon Aug 28 2023 Jan Stancek <jstancek@redhat.com> [5.14.0-362.el9]
|
||||
- smb: client: fix null auth (Scott Mayhew) [2223247]
|
||||
- ice: Fix NULL pointer deref during VF reset (Petr Oros) [2217304]
|
||||
- gfs2: conversion deadlock do_promote bypass (Bob Peterson) [2226861]
|
||||
- gfs2: do_promote cleanup (Andreas Gruenbacher) [2226861]
|
||||
- scsi: lpfc: Remove reftag check in DIF paths (Paul Ely) [2227947]
|
||||
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (Paul Ely) [2227947]
|
||||
- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (Paul Ely) [2227947]
|
||||
- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (Paul Ely) [2227947]
|
||||
- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (Paul Ely) [2227947]
|
||||
- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (Paul Ely) [2227947]
|
||||
- ext4: drop dio overwrite only flag and associated warning (Brian Foster) [2228056]
|
||||
- sched/core: Add __always_inline to schedule_loop() (Crystal Wood) [2232098]
|
||||
- net: openvswitch: add misc error drop reasons (Adrian Moreno) [2232283]
|
||||
- net: openvswitch: add meter drop reason (Adrian Moreno) [2232283]
|
||||
- net: openvswitch: add explicit drop action (Adrian Moreno) [2232283]
|
||||
- net: openvswitch: add action error drop reason (Adrian Moreno) [2232283]
|
||||
- net: openvswitch: add last-action drop reason (Adrian Moreno) [2232283]
|
||||
- net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128}
|
||||
- net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128}
|
||||
- net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free (Davide Caratti) [2225513] {CVE-2023-4128}
|
||||
- x86/kasan: Populate shadow for shared chunk of the CPU entry area (Rafael Aquini) [2233699]
|
||||
- x86/kasan: Add helpers to align shadow addresses up and down (Rafael Aquini) [2233699]
|
||||
- x86/kasan: Rename local CPU_ENTRY_AREA variables to shorten names (Rafael Aquini) [2233699]
|
||||
- x86/mm: Populate KASAN shadow for entire per-CPU range of CPU entry area (Rafael Aquini) [2233699]
|
||||
- x86/mm: Recompute physical address for every page of per-CPU CEA mapping (Rafael Aquini) [2233699]
|
||||
|
||||
* Thu Aug 24 2023 Jan Stancek <jstancek@redhat.com> [5.14.0-361.el9]
|
||||
- watch_queue: Free the page array when watch_queue is dismantled (Carlos Maiolino) [2231268]
|
||||
- watch_queue: Actually free the watch (Carlos Maiolino) [2231268]
|
||||
|
6
sources
6
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (linux-5.14.0-361.el9.tar.xz) = 3837c467aeb234ba0b49162d66e485632100dab82cdbb842f48ce80e86f93a9fc5fa0ebfaafd10c583e61542a8e3d330b7e6a02c8359bb2f0c6b5ddecf5d9959
|
||||
SHA512 (kernel-abi-stablelists-5.14.0-361.el9.tar.bz2) = fa3e0ce3735158136abe07045ef29ae50983d16f8090345d90915170a5dcec9d9c13adf4ae4f4aaa8dab4426634d45382ca3dbbad3905b445cc352f2c2c4b985
|
||||
SHA512 (kernel-kabi-dw-5.14.0-361.el9.tar.bz2) = 119e820407c58c1868a04aa69c969a881bd672f0f7111a8b382a7369bc89e57667faab180be0b4932dbfbfeb25267787c56fb155dba1ccb244922a7a130d187b
|
||||
SHA512 (linux-5.14.0-362.el9.tar.xz) = a4ec0caff14af33f18c88c62325598259514f299b044c4a024515a9a3826133780f9835353b4a8d15471e9d56986330a54656a04dbaab755ccc7f5144b1cde24
|
||||
SHA512 (kernel-abi-stablelists-5.14.0-362.el9.tar.bz2) = 3ca701c41038d55ae4fddbbac6c520294be914734b78f0f8486b76355ba420381701e52bb339249b5315ab649d0631f9b836be945260e58e2a996a2f454d3bb5
|
||||
SHA512 (kernel-kabi-dw-5.14.0-362.el9.tar.bz2) = 119e820407c58c1868a04aa69c969a881bd672f0f7111a8b382a7369bc89e57667faab180be0b4932dbfbfeb25267787c56fb155dba1ccb244922a7a130d187b
|
||||
|
Loading…
Reference in New Issue
Block a user