kernel-4.18.0-510.el8
* Tue Aug 15 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-510.el8] - x86/show_trace_log_lvl: Ensure stack pointer is aligned, again (Oleg Nesterov) [2188093] - ahci: Add support for Dell S140 and later controllers (Tomas Henzl) [2222879] - s390/time: steer clocksource on STP syncs for CLOCK_MONOTONIC (Tobias Huschle) [2177649] - memstick: r592: Fix UAF bug in r592_remove due to race condition (Wander Lairson Costa) [2215906] {CVE-2023-35825} - scsi: zfcp: Defer fc_rport blocking until after ADISC response (Tobias Huschle) [2230241] - RDMA/efa: Add EFA 0xefa2 PCI ID (Izabela Bakollari) [2170086] - RDMA/efa: Support CQ receive entries with source GID (Izabela Bakollari) [2170086] - Revert "isystem: ship and use stdarg.h" (Jocelyn Falempe) [2229185] - drm/drm_print: Use system include for <stdargs.h> (Jocelyn Falempe) [2229185] - x86/mm: Do not shuffle CPU entry areas without KASLR (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/mm: Randomize per-cpu entry area (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/kasan: Map shadow for percpu pages on demand (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise (Rafael Aquini) [2165931] {CVE-2023-0597} Resolves: rhbz#2165931, rhbz#2170086, rhbz#2177649, rhbz#2188093, rhbz#2215906, rhbz#2222879, rhbz#2229185, rhbz#2230241 Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
This commit is contained in:
parent
5849343bf2
commit
54e0b4f895
21
kernel.spec
21
kernel.spec
@ -12,7 +12,7 @@
|
||||
# change below to w4T.xzdio):
|
||||
%define _binary_payload w3T.xzdio
|
||||
|
||||
%global distro_build 509
|
||||
%global distro_build 510
|
||||
|
||||
# Sign the x86_64 kernel for secure boot authentication
|
||||
%ifarch x86_64 aarch64 s390x ppc64le
|
||||
@ -38,10 +38,10 @@
|
||||
# define buildid .local
|
||||
|
||||
%define rpmversion 4.18.0
|
||||
%define pkgrelease 509.el8
|
||||
%define pkgrelease 510.el8
|
||||
|
||||
# allow pkg_release to have configurable %%{?dist} tag
|
||||
%define specrelease 509%{?dist}
|
||||
%define specrelease 510%{?dist}
|
||||
|
||||
%define pkg_release %{specrelease}%{?buildid}
|
||||
|
||||
@ -2695,6 +2695,21 @@ fi
|
||||
#
|
||||
#
|
||||
%changelog
|
||||
* Tue Aug 15 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-510.el8]
|
||||
- x86/show_trace_log_lvl: Ensure stack pointer is aligned, again (Oleg Nesterov) [2188093]
|
||||
- ahci: Add support for Dell S140 and later controllers (Tomas Henzl) [2222879]
|
||||
- s390/time: steer clocksource on STP syncs for CLOCK_MONOTONIC (Tobias Huschle) [2177649]
|
||||
- memstick: r592: Fix UAF bug in r592_remove due to race condition (Wander Lairson Costa) [2215906] {CVE-2023-35825}
|
||||
- scsi: zfcp: Defer fc_rport blocking until after ADISC response (Tobias Huschle) [2230241]
|
||||
- RDMA/efa: Add EFA 0xefa2 PCI ID (Izabela Bakollari) [2170086]
|
||||
- RDMA/efa: Support CQ receive entries with source GID (Izabela Bakollari) [2170086]
|
||||
- Revert "isystem: ship and use stdarg.h" (Jocelyn Falempe) [2229185]
|
||||
- drm/drm_print: Use system include for <stdargs.h> (Jocelyn Falempe) [2229185]
|
||||
- x86/mm: Do not shuffle CPU entry areas without KASLR (Rafael Aquini) [2165931] {CVE-2023-0597}
|
||||
- x86/mm: Randomize per-cpu entry area (Rafael Aquini) [2165931] {CVE-2023-0597}
|
||||
- x86/kasan: Map shadow for percpu pages on demand (Rafael Aquini) [2165931] {CVE-2023-0597}
|
||||
- x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise (Rafael Aquini) [2165931] {CVE-2023-0597}
|
||||
|
||||
* Wed Aug 09 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-509.el8]
|
||||
- cifs: fix for following DFS links where sharename is the same as prepath (Ronnie Sahlberg) [2130474]
|
||||
- crypto: rng - Fix lock imbalance in crypto_del_rng (Herbert Xu) [2229700]
|
||||
|
6
sources
6
sources
@ -1,3 +1,3 @@
|
||||
SHA512 (linux-4.18.0-509.el8.tar.xz) = f4e0a1059a863b81946183176b664decb73a811a4f119c3bcc1029af98261a8a1b285003da0236f8e3a7aae65769d5686dbee8cf1e629931226ccf0fa6cb44af
|
||||
SHA512 (kernel-abi-stablelists-4.18.0-509.tar.bz2) = b03c103cf4e92ea9960a16bffe035ced99dbdc9f54494042d53c58dafcc53527519b95d01f99f98ad9b1f5fb126b91bb3dd408b9293ee3dabd3111a49e5cbdc0
|
||||
SHA512 (kernel-kabi-dw-4.18.0-509.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32
|
||||
SHA512 (linux-4.18.0-510.el8.tar.xz) = e0e76b26efc9a80be50d5c3b47c67a52ea9f78cf55f9acdb8bac285d45c736423793938f43d0121af2a22c0e4ba2cdeb3b8cf91ef0633c2fb942638f3cbcaeed
|
||||
SHA512 (kernel-abi-stablelists-4.18.0-510.tar.bz2) = 0e10ba9f4f5c82fbf5fa4079d8b9b7222bc22517a37311ccc7850ac06174a60f7ce6a9b1bee6d11216e2f7fb3b7f398a27eb9de993da0ba71a69460f4ae42c15
|
||||
SHA512 (kernel-kabi-dw-4.18.0-510.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32
|
||||
|
Loading…
Reference in New Issue
Block a user