From 54e0b4f89564b24247326a15ab2eba01854c10d7 Mon Sep 17 00:00:00 2001 From: Denys Vlasenko Date: Tue, 15 Aug 2023 16:52:18 +0200 Subject: [PATCH] kernel-4.18.0-510.el8 * Tue Aug 15 2023 Denys Vlasenko [4.18.0-510.el8] - x86/show_trace_log_lvl: Ensure stack pointer is aligned, again (Oleg Nesterov) [2188093] - ahci: Add support for Dell S140 and later controllers (Tomas Henzl) [2222879] - s390/time: steer clocksource on STP syncs for CLOCK_MONOTONIC (Tobias Huschle) [2177649] - memstick: r592: Fix UAF bug in r592_remove due to race condition (Wander Lairson Costa) [2215906] {CVE-2023-35825} - scsi: zfcp: Defer fc_rport blocking until after ADISC response (Tobias Huschle) [2230241] - RDMA/efa: Add EFA 0xefa2 PCI ID (Izabela Bakollari) [2170086] - RDMA/efa: Support CQ receive entries with source GID (Izabela Bakollari) [2170086] - Revert "isystem: ship and use stdarg.h" (Jocelyn Falempe) [2229185] - drm/drm_print: Use system include for (Jocelyn Falempe) [2229185] - x86/mm: Do not shuffle CPU entry areas without KASLR (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/mm: Randomize per-cpu entry area (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/kasan: Map shadow for percpu pages on demand (Rafael Aquini) [2165931] {CVE-2023-0597} - x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise (Rafael Aquini) [2165931] {CVE-2023-0597} Resolves: rhbz#2165931, rhbz#2170086, rhbz#2177649, rhbz#2188093, rhbz#2215906, rhbz#2222879, rhbz#2229185, rhbz#2230241 Signed-off-by: Denys Vlasenko --- kernel.spec | 21 ++++++++++++++++++--- sources | 6 +++--- 2 files changed, 21 insertions(+), 6 deletions(-) diff --git a/kernel.spec b/kernel.spec index d37d79035..54b0d8490 100644 --- a/kernel.spec +++ b/kernel.spec @@ -12,7 +12,7 @@ # change below to w4T.xzdio): %define _binary_payload w3T.xzdio -%global distro_build 509 +%global distro_build 510 # Sign the x86_64 kernel for secure boot authentication %ifarch x86_64 aarch64 s390x ppc64le @@ -38,10 +38,10 @@ # define buildid .local %define rpmversion 4.18.0 -%define pkgrelease 509.el8 +%define pkgrelease 510.el8 # allow pkg_release to have configurable %%{?dist} tag -%define specrelease 509%{?dist} +%define specrelease 510%{?dist} %define pkg_release %{specrelease}%{?buildid} @@ -2695,6 +2695,21 @@ fi # # %changelog +* Tue Aug 15 2023 Denys Vlasenko [4.18.0-510.el8] +- x86/show_trace_log_lvl: Ensure stack pointer is aligned, again (Oleg Nesterov) [2188093] +- ahci: Add support for Dell S140 and later controllers (Tomas Henzl) [2222879] +- s390/time: steer clocksource on STP syncs for CLOCK_MONOTONIC (Tobias Huschle) [2177649] +- memstick: r592: Fix UAF bug in r592_remove due to race condition (Wander Lairson Costa) [2215906] {CVE-2023-35825} +- scsi: zfcp: Defer fc_rport blocking until after ADISC response (Tobias Huschle) [2230241] +- RDMA/efa: Add EFA 0xefa2 PCI ID (Izabela Bakollari) [2170086] +- RDMA/efa: Support CQ receive entries with source GID (Izabela Bakollari) [2170086] +- Revert "isystem: ship and use stdarg.h" (Jocelyn Falempe) [2229185] +- drm/drm_print: Use system include for (Jocelyn Falempe) [2229185] +- x86/mm: Do not shuffle CPU entry areas without KASLR (Rafael Aquini) [2165931] {CVE-2023-0597} +- x86/mm: Randomize per-cpu entry area (Rafael Aquini) [2165931] {CVE-2023-0597} +- x86/kasan: Map shadow for percpu pages on demand (Rafael Aquini) [2165931] {CVE-2023-0597} +- x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make the CPU_ENTRY_AREA_PAGES assert precise (Rafael Aquini) [2165931] {CVE-2023-0597} + * Wed Aug 09 2023 Denys Vlasenko [4.18.0-509.el8] - cifs: fix for following DFS links where sharename is the same as prepath (Ronnie Sahlberg) [2130474] - crypto: rng - Fix lock imbalance in crypto_del_rng (Herbert Xu) [2229700] diff --git a/sources b/sources index 1c7723371..a49c2f044 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (linux-4.18.0-509.el8.tar.xz) = f4e0a1059a863b81946183176b664decb73a811a4f119c3bcc1029af98261a8a1b285003da0236f8e3a7aae65769d5686dbee8cf1e629931226ccf0fa6cb44af -SHA512 (kernel-abi-stablelists-4.18.0-509.tar.bz2) = b03c103cf4e92ea9960a16bffe035ced99dbdc9f54494042d53c58dafcc53527519b95d01f99f98ad9b1f5fb126b91bb3dd408b9293ee3dabd3111a49e5cbdc0 -SHA512 (kernel-kabi-dw-4.18.0-509.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32 +SHA512 (linux-4.18.0-510.el8.tar.xz) = e0e76b26efc9a80be50d5c3b47c67a52ea9f78cf55f9acdb8bac285d45c736423793938f43d0121af2a22c0e4ba2cdeb3b8cf91ef0633c2fb942638f3cbcaeed +SHA512 (kernel-abi-stablelists-4.18.0-510.tar.bz2) = 0e10ba9f4f5c82fbf5fa4079d8b9b7222bc22517a37311ccc7850ac06174a60f7ce6a9b1bee6d11216e2f7fb3b7f398a27eb9de993da0ba71a69460f4ae42c15 +SHA512 (kernel-kabi-dw-4.18.0-510.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32