import kernel-4.18.0-348.23.1.el8_5
This commit is contained in:
parent
27d8e06bcd
commit
4f5abda419
2
.gitignore
vendored
2
.gitignore
vendored
@ -1,5 +1,5 @@
|
||||
SOURCES/kernel-abi-stablelists-4.18.0-348.tar.bz2
|
||||
SOURCES/kernel-kabi-dw-4.18.0-348.tar.bz2
|
||||
SOURCES/linux-4.18.0-348.20.1.el8_5.tar.xz
|
||||
SOURCES/linux-4.18.0-348.23.1.el8_5.tar.xz
|
||||
SOURCES/rheldup3.x509
|
||||
SOURCES/rhelkpatch1.x509
|
||||
|
@ -1,5 +1,5 @@
|
||||
2d622b532a9ac503406373ef5fa5bea1192086d1 SOURCES/kernel-abi-stablelists-4.18.0-348.tar.bz2
|
||||
109f15ce9699bfa93bd9dc4f8e88013ce341e0e7 SOURCES/kernel-kabi-dw-4.18.0-348.tar.bz2
|
||||
c99d0884876479c3b07cb3e3773cad5884b12407 SOURCES/linux-4.18.0-348.20.1.el8_5.tar.xz
|
||||
467df17ac61fe223d93b660ad53a7375c6ad4ba5 SOURCES/linux-4.18.0-348.23.1.el8_5.tar.xz
|
||||
95b9b811c7b0a6c98b2eafc4e7d6d24f2cb63289 SOURCES/rheldup3.x509
|
||||
d90885108d225a234a5a9d054fc80893a5bd54d0 SOURCES/rhelkpatch1.x509
|
||||
|
@ -42,10 +42,10 @@
|
||||
# define buildid .local
|
||||
|
||||
%define rpmversion 4.18.0
|
||||
%define pkgrelease 348.20.1.el8_5
|
||||
%define pkgrelease 348.23.1.el8_5
|
||||
|
||||
# allow pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 348.20.1%{?dist}
|
||||
%define specrelease 348.23.1%{?dist}
|
||||
|
||||
%define pkg_release %{specrelease}%{?buildid}
|
||||
|
||||
@ -2643,6 +2643,22 @@ fi
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Tue Apr 12 2022 Bruno Meneguele <bmeneg@redhat.com> [4.18.0-348.23.1.el8_5]
|
||||
- gfs2: dequeue iopen holder in gfs2_inode_lookup error (Bob Peterson) [2069750 2061665]
|
||||
|
||||
* Tue Apr 05 2022 Bruno Meneguele <bmeneg@redhat.com> [4.18.0-348.22.1.el8_5]
|
||||
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (Dick Kennedy) [2058193 2027558]
|
||||
- cifs: check all path components in resolved dfs target (Ronnie Sahlberg) [2056329 2030880]
|
||||
- RDMA/cma: Do not change route.addr.src_addr.ss_family (Kamal Heib) [2032073 2032074] {CVE-2021-4028}
|
||||
|
||||
* Tue Mar 22 2022 Bruno Meneguele <bmeneg@redhat.com> [4.18.0-348.21.1.el8_5]
|
||||
- netfilter: nf_queue: handle socket prefetch (Florian Westphal) [2061446 2009786]
|
||||
- netfilter: nf_queue: fix possible use-after-free (Florian Westphal) [2061446 2009786]
|
||||
- selftests: netfilter: add nfqueue TCP_NEW_SYN_RECV socket race test (Florian Westphal) [2061446 2009786]
|
||||
- netfilter: nf_queue: don't assume sk is full socket (Florian Westphal) [2061446 2009786]
|
||||
- netfilter: nf_tables_offload: incorrect flow offload action array size (Florian Westphal) [2056867 2056728] {CVE-2022-25636}
|
||||
- netfilter: nftables_offload: KASAN slab-out-of-bounds Read in nft_flow_rule_create (Florian Westphal) [2056867 2056728] {CVE-2022-25636}
|
||||
|
||||
* Tue Mar 08 2022 Bruno Meneguele <bmeneg@redhat.com> [4.18.0-348.20.1.el8_5]
|
||||
- lib/iov_iter: initialize "flags" in new pipe_buffer (Jan Stancek) [2060874 2060875] {CVE-2022-0847}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user