import OL kernel-5.14.0-503.19.1.el9_5
This commit is contained in:
parent
f43cda8a99
commit
5c2ff7b905
6
.gitignore
vendored
6
.gitignore
vendored
@ -1,6 +1,6 @@
|
|||||||
SOURCES/kernel-abi-stablelists-5.14.0-503.16.1.el9_5.tar.bz2
|
SOURCES/kernel-abi-stablelists-5.14.0-503.19.1.el9_5.tar.bz2
|
||||||
SOURCES/kernel-kabi-dw-5.14.0-503.16.1.el9_5.tar.bz2
|
SOURCES/kernel-kabi-dw-5.14.0-503.19.1.el9_5.tar.bz2
|
||||||
SOURCES/linux-5.14.0-503.16.1.el9_5.tar.xz
|
SOURCES/linux-5.14.0-503.19.1.el9_5.tar.xz
|
||||||
SOURCES/nvidiagpuoot001.x509
|
SOURCES/nvidiagpuoot001.x509
|
||||||
SOURCES/olima1.x509
|
SOURCES/olima1.x509
|
||||||
SOURCES/olimaca1.x509
|
SOURCES/olimaca1.x509
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
eb508bda21e847379475244ff30e49c39d013b24 SOURCES/kernel-abi-stablelists-5.14.0-503.16.1.el9_5.tar.bz2
|
a614816812a77eadc37c3e71e3b794d58ee62596 SOURCES/kernel-abi-stablelists-5.14.0-503.19.1.el9_5.tar.bz2
|
||||||
e9e2291a74b15dc55d0faca4547de21279416f24 SOURCES/kernel-kabi-dw-5.14.0-503.16.1.el9_5.tar.bz2
|
3125e053f6237338119f6f6c32eb3144b0fcbff3 SOURCES/kernel-kabi-dw-5.14.0-503.19.1.el9_5.tar.bz2
|
||||||
513864f65cc6a1b4772a8516f1f3ea69ef9d8361 SOURCES/linux-5.14.0-503.16.1.el9_5.tar.xz
|
cb25584103dd0b8aa392bac6d1dbf713dc975219 SOURCES/linux-5.14.0-503.19.1.el9_5.tar.xz
|
||||||
4fff8080e88afffc06d8ef5004db8d53bb21237f SOURCES/nvidiagpuoot001.x509
|
4fff8080e88afffc06d8ef5004db8d53bb21237f SOURCES/nvidiagpuoot001.x509
|
||||||
706ae01dd14efa38f0f565a3706acac19c78df02 SOURCES/olima1.x509
|
706ae01dd14efa38f0f565a3706acac19c78df02 SOURCES/olima1.x509
|
||||||
6e3f0d61414c0b50f48dc2d4c3b3cd024e1c3a43 SOURCES/olimaca1.x509
|
6e3f0d61414c0b50f48dc2d4c3b3cd024e1c3a43 SOURCES/olimaca1.x509
|
||||||
|
59
SOURCES/1000-debrand-some-messages.patch
Normal file
59
SOURCES/1000-debrand-some-messages.patch
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
From 6ca79c451f7508fc1916113fd0cdba2140c14818 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Louis Abel <label@rockylinux.org>
|
||||||
|
Date: Wed, 20 Sep 2023 14:16:05 -0700
|
||||||
|
Subject: [PATCH] debrand some messages
|
||||||
|
|
||||||
|
Modified-by: Alex Burmashev <alexander.burmashev@oracle.com>
|
||||||
|
---
|
||||||
|
kernel/rh_shadowman.c | 55 ++++++++++++++++++++++---------------------
|
||||||
|
4 files changed, 34 insertions(+), 33 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/kernel/rh_shadowman.c b/kernel/rh_shadowman.c
|
||||||
|
index 018d5c633..d05ea0790 100644
|
||||||
|
--- a/kernel/rh_shadowman.c
|
||||||
|
+++ b/kernel/rh_shadowman.c
|
||||||
|
@@ -1,39 +1 @@
|
||||||
|
-#include <linux/kernel.h>
|
||||||
|
-#include <linux/module.h>
|
||||||
|
-#include <linux/printk.h>
|
||||||
|
-
|
||||||
|
-/* Display a shadowman logo on the console screen */
|
||||||
|
-static int __init rh_shadowman(char *str)
|
||||||
|
-{
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRRRRrrrrrrrrrrrrrrrORHRrrHRRRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRRHrr8rrrrrrrrrrrrrrrrrrrrhRRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRHRRRRRRRRRRRrrHRHRRRHHHrrrrrrrrrrrrrHRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRHrrrrrHrrrrrrrrrrrrrrrrrrrrRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRHh88hhRHrrrrrrrrrrrrrrrrrrrrrrrrrrHRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRrrrrrrrrrRHRH8rrrrrrrrrrrrrrrrrrrrrrr8RRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRH8rrrrrrrrrrRHRRRRRRRRRHrrrrrrrrrrrrrrrrRrhHRHRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRROrrrrrrrrrrrORRRRRRRRRRRrrrrrrrrrrrrrHrrrrrrhRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRROrrrrrrrrrrrrrrr8RRRRHRrrrrrrrrrrrrrrrrrrrrrHRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRHhrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRH. .HHHrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRR. .RRhRRHH8rrrrrrrrrrrrrrrrrrrrr8RRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRR~ .RRRRRRRRRHHh8OOOOO8HRRHRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("R,```` RRR8 .hHRRRh\\hHH:=HRh.RRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RR ORRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRR ,HHtaa HRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRO. .RRRRO. . .RRRRRRR\n");
|
||||||
|
- pr_info("RRRRRR ,RRHh, :RRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRR HRR :RRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRr .. ,RRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRt . .HRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRRRr. =RRRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info("RRRRRRRRRRRRRRRRRRRRRRRRHHr: .:tRhRRRRRRRRRRRRRRRRRRRRRRRRRR\n");
|
||||||
|
- pr_info(" ");
|
||||||
|
- pr_info(" Long Live Shadowman!");
|
||||||
|
- pr_info("576527726520686972696e6721a68747470733a2f2f7777772e7265646861742e636f6d2f6a6f6273");
|
||||||
|
- pr_info(" ");
|
||||||
|
- return 1;
|
||||||
|
-}
|
||||||
|
-
|
||||||
|
-__setup("shadowman", rh_shadowman);
|
||||||
|
+// This file has been intentionally left blank
|
||||||
|
--
|
||||||
|
2.41.0
|
||||||
|
|
||||||
|
|
@ -12,7 +12,7 @@ RHEL_MINOR = 5
|
|||||||
#
|
#
|
||||||
# Use this spot to avoid future merge conflicts.
|
# Use this spot to avoid future merge conflicts.
|
||||||
# Do not trim this comment.
|
# Do not trim this comment.
|
||||||
RHEL_RELEASE = 503.16.1
|
RHEL_RELEASE = 503.19.1
|
||||||
|
|
||||||
#
|
#
|
||||||
# ZSTREAM
|
# ZSTREAM
|
||||||
|
19
SOURCES/bug34729535-change-certified-hw-message.patch
Normal file
19
SOURCES/bug34729535-change-certified-hw-message.patch
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
Update message about certified hardware list.
|
||||||
|
|
||||||
|
Orabug: 34729535
|
||||||
|
|
||||||
|
Signed-off-by: Kevin Lyons <kevin.x.lyons@oracle.com>
|
||||||
|
Reviewed-by: Laurence Rochfort <laurence.rochfort@oracle.com>
|
||||||
|
---
|
||||||
|
diff -ruN linux-5.14.0-160.el8.x86_64.orig/init/main.c linux-5.14.0-160.el8.x86_64/init/main.c
|
||||||
|
--- linux-5.14.0-160.el8.x86_64.orig/init/main.c 2022-08-25 13:57:06.000000000 -0700
|
||||||
|
+++ linux-5.14.0-160.el8.x86_64/init/main.c 2022-10-26 13:15:39.700724777 -0700
|
||||||
|
@@ -936,7 +936,7 @@
|
||||||
|
boot_cpu_init();
|
||||||
|
page_address_init();
|
||||||
|
pr_notice("%s", linux_banner);
|
||||||
|
- pr_notice("The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com.\n");
|
||||||
|
+ pr_notice("The list of certified hardware for Oracle Linux 9 can be viewed at the Oracle Linux Certification List https://linux.oracle.com/hardware-certifications\n");
|
||||||
|
early_security_init();
|
||||||
|
setup_arch(&command_line);
|
||||||
|
setup_boot_config();
|
@ -1,3 +1,52 @@
|
|||||||
|
* Fri Dec 06 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.19.1.el9_5]
|
||||||
|
- xfrm: validate new SA's prefixlen using SA family when sel.family is unset (Sabrina Dubroca) [RHEL-66462 RHEL-66461] {CVE-2024-50142}
|
||||||
|
- xfrm: fix one more kernel-infoleak in algo dumping (CKI Backport Bot) [RHEL-65960] {CVE-2024-50110}
|
||||||
|
- Revert "Merge: [qed] softlockup triggered by ethtool -d [rhel-9.5.z]" (Lucas Zampieri) [RHEL-61705]
|
||||||
|
- tracing/hwlat: Fix a race during cpuhp processing (Tomas Glozar) [RHEL-69468]
|
||||||
|
- tracing/timerlat: Fix a race during cpuhp processing (Tomas Glozar) [RHEL-69468] {CVE-2024-49866}
|
||||||
|
- tracing/timerlat: Drop interface_lock in stop_kthread() (Tomas Glozar) [RHEL-69468]
|
||||||
|
- tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (Tomas Glozar) [RHEL-69468]
|
||||||
|
- ceph: remove the incorrect Fw reference check when dirtying pages (Xiubo Li) [RHEL-61416 RHEL-60255]
|
||||||
|
Resolves: RHEL-61416, RHEL-61705, RHEL-65960, RHEL-66462, RHEL-69468
|
||||||
|
|
||||||
|
* Tue Dec 03 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.18.1.el9_5]
|
||||||
|
- bpf: Fix a kernel verifier crash in stacksafe() (CKI Backport Bot) [RHEL-66097 RHEL-66098] {CVE-2024-45020}
|
||||||
|
- bpf: Fix a sdiv overflow issue (CKI Backport Bot) [RHEL-64598 RHEL-64597] {CVE-2024-49888}
|
||||||
|
- bpf: Fix out-of-bounds write in trie_get_next_key() (CKI Backport Bot) [RHEL-66877] {CVE-2024-50262}
|
||||||
|
- bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (CKI Backport Bot) [RHEL-63331] {CVE-2024-47675}
|
||||||
|
- nfsd: ensure that nfsd4_fattr_args.context is zeroed out (Jay Shin) [RHEL-58884 RHEL-58883] {CVE-2024-46697}
|
||||||
|
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (Jon Maloy) [RHEL-65872] {CVE-2024-50115}
|
||||||
|
- net: tighten bad gso csum offset check in virtio_net_hdr (Guillaume Nault) [RHEL-67683]
|
||||||
|
- udp: fix receiving fraglist GSO packets (Guillaume Nault) [RHEL-67683]
|
||||||
|
- Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (CKI Backport Bot) [RHEL-66804] {CVE-2024-50255}
|
||||||
|
- Bluetooth: ISO: Fix UAF on iso_sock_timeout (Bastien Nocera) [RHEL-66321] {CVE-2024-50124}
|
||||||
|
- Bluetooth: SCO: Fix UAF on sco_sock_timeout (Bastien Nocera) [RHEL-65928] {CVE-2024-50125}
|
||||||
|
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (Bastien Nocera) [RHEL-65928] {CVE-2024-27398}
|
||||||
|
- bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CKI Backport Bot) [RHEL-44173] {CVE-2024-38564}
|
||||||
|
- Bluetooth: bnep: fix wild-memory-access in proto_unregister (CKI Backport Bot) [RHEL-66365] {CVE-2024-50148}
|
||||||
|
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CKI Backport Bot) [RHEL-57716 RHEL-36374] {CVE-2024-27399}
|
||||||
|
Resolves: RHEL-44173, RHEL-57716, RHEL-58884, RHEL-63331, RHEL-64598, RHEL-65872, RHEL-65928, RHEL-66097, RHEL-66321, RHEL-66365, RHEL-66804, RHEL-66877, RHEL-67683
|
||||||
|
|
||||||
|
* Thu Nov 28 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.17.1.el9_5]
|
||||||
|
- arm64: probes: Remove broken LDR (literal) uprobe support (CKI Backport Bot) [RHEL-66046] {CVE-2024-50099}
|
||||||
|
- qed: put cond_resched() in qed_dmae_operation_wait() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: allow the callee of qed_mcp_nvm_read() to sleep (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: put cond_resched() in qed_grc_dump_ctx_data() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: make 'ethtool -d' 10 times faster (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: allow sleep in qed_mcp_trace_dump() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- sched/numa: Fix the potential null pointer dereference in task_numa_work() (CKI Backport Bot) [RHEL-66810] {CVE-2024-50223}
|
||||||
|
- irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (Charles Mirabile) [RHEL-66969] {CVE-2024-50192}
|
||||||
|
- irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (Charles Mirabile) [RHEL-66969] {CVE-2024-50192}
|
||||||
|
- perf/x86/intel/uncore: Support HBM and CXL PMON counters (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Cleanup unused unit structure (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Support per PMU cpumask (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Save the unit control address of all units (Michael Petlan) [RHEL-65856]
|
||||||
|
Resolves: RHEL-61705, RHEL-65856, RHEL-66046, RHEL-66810, RHEL-66969
|
||||||
|
|
||||||
* Thu Nov 21 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.16.1.el9_5]
|
* Thu Nov 21 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.16.1.el9_5]
|
||||||
- s390/dasd: fix error recovery leading to data corruption on ESE devices (Mete Durlu) [RHEL-64902 RHEL-55873]
|
- s390/dasd: fix error recovery leading to data corruption on ESE devices (Mete Durlu) [RHEL-64902 RHEL-55873]
|
||||||
- net/smc: fix illegal rmb_desc access in SMC-D connection dump (Steve Best) [RHEL-65436 RHEL-27748] {CVE-2024-26615}
|
- net/smc: fix illegal rmb_desc access in SMC-D connection dump (Steve Best) [RHEL-65436 RHEL-27748] {CVE-2024-26615}
|
||||||
|
24
SOURCES/olkmod_signing_key.pem
Normal file
24
SOURCES/olkmod_signing_key.pem
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIEETCCAvmgAwIBAgIJANw8y5k9b7SaMA0GCSqGSIb3DQEBCwUAMIGeMQswCQYD
|
||||||
|
VQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEXMBUGA1UEBwwOUmVkd29vZCBT
|
||||||
|
aG9yZXMxGzAZBgNVBAoMEk9yYWNsZSBDb3Jwb3JhdGlvbjEVMBMGA1UECwwMT3Jh
|
||||||
|
Y2xlIExpbnV4MS0wKwYDVQQDDCRPcmFjbGUgTGludXggUkhDSyBNb2R1bGUgU2ln
|
||||||
|
bmluZyBLZXkwHhcNMTYwNTA5MjMzNjA4WhcNMjYwNTA3MjMzNjA4WjCBnjELMAkG
|
||||||
|
A1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFzAVBgNVBAcMDlJlZHdvb2Qg
|
||||||
|
U2hvcmVzMRswGQYDVQQKDBJPcmFjbGUgQ29ycG9yYXRpb24xFTATBgNVBAsMDE9y
|
||||||
|
YWNsZSBMaW51eDEtMCsGA1UEAwwkT3JhY2xlIExpbnV4IFJIQ0sgTW9kdWxlIFNp
|
||||||
|
Z25pbmcgS2V5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl6bUDNNZ
|
||||||
|
jIqgsqgspwBIQ18keDxQeGnWgubZZhHrQU3GpeSRPM4lNTHc+UjMjNXrv/CENZdv
|
||||||
|
4cETRsxT1VFhGG3CvkbQdzc8v4JOQvWSSJqmViPa1eC+yGaMRnGcFXzKsHiTLA4y
|
||||||
|
WMjpJnVowFkwTzscRBlN0AysUg/hT/74DE0oqVnlCJNynqccNWpx8MtNRD55ay9A
|
||||||
|
73yJinYES14rXcU3QbJoO0ZxtRz83ZACDUGX0GORT3+NbB0RK0sttogzA3eLvxKw
|
||||||
|
umWsWZAHmTuHdWgUjSqqZr34VNLPVcsTHAW8X4bq6rRVcB2lMJ3kJfDP8BJyTn99
|
||||||
|
37UmA+/ld47cnwIDAQABo1AwTjAdBgNVHQ4EFgQU3ZlbFVwZs6fD73cHuWniX5Y5
|
||||||
|
Zm4wHwYDVR0jBBgwFoAU3ZlbFVwZs6fD73cHuWniX5Y5Zm4wDAYDVR0TBAUwAwEB
|
||||||
|
/zANBgkqhkiG9w0BAQsFAAOCAQEAF7nfhWfsk4uEDquLj7nJE0wPlVvllVDugzOk
|
||||||
|
R15pnQ7P+HTyz3sLaLJE4N5oWt6pFzDGDYEtPeoMCn1l447tX179Nf5SMZba9ut8
|
||||||
|
3Vxbe7jAn9sQO7ArQR1swf1r101Me4+1oHq7rxPRizOOXrKeEvf5NSAUbSzzXfz6
|
||||||
|
TEp21KTIQO7MjqpsKshRQbpPeiReaYy3A6gJftun5xekP04QTLZVBR4dL7tvZf0S
|
||||||
|
y9SjVg158lONXHfjBekyYTzSFBn/7v+AS8S+cAGRfYteE0Syxl7zJt3GUoEWau/e
|
||||||
|
kXHT+hd/hkdSQKZZWZo1380M1pVZZAvntLRBU6IN9SswafhiVg==
|
||||||
|
-----END CERTIFICATE-----
|
@ -5,9 +5,9 @@ prompt = no
|
|||||||
x509_extensions = myexts
|
x509_extensions = myexts
|
||||||
|
|
||||||
[ req_distinguished_name ]
|
[ req_distinguished_name ]
|
||||||
O = Red Hat
|
O = Oracle America, Inc.,c=US
|
||||||
CN = Red Hat Enterprise Linux kernel signing key
|
CN = Oracle CA Server
|
||||||
emailAddress = secalert@redhat.com
|
emailAddress = support@oracle.com
|
||||||
|
|
||||||
[ myexts ]
|
[ myexts ]
|
||||||
basicConstraints=critical,CA:FALSE
|
basicConstraints=critical,CA:FALSE
|
||||||
|
130
SPECS/kernel.spec
Normal file → Executable file
130
SPECS/kernel.spec
Normal file → Executable file
@ -104,7 +104,7 @@ Summary: The Linux kernel
|
|||||||
%if 0%{?fedora}
|
%if 0%{?fedora}
|
||||||
%define secure_boot_arch x86_64
|
%define secure_boot_arch x86_64
|
||||||
%else
|
%else
|
||||||
%define secure_boot_arch x86_64 aarch64 s390x ppc64le
|
%define secure_boot_arch x86_64 s390x ppc64le
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
# Signing for secure boot authentication
|
# Signing for secure boot authentication
|
||||||
@ -165,15 +165,15 @@ Summary: The Linux kernel
|
|||||||
# define buildid .local
|
# define buildid .local
|
||||||
%define specversion 5.14.0
|
%define specversion 5.14.0
|
||||||
%define patchversion 5.14
|
%define patchversion 5.14
|
||||||
%define pkgrelease 503.16.1
|
%define pkgrelease 503.19.1
|
||||||
%define kversion 5
|
%define kversion 5
|
||||||
%define tarfile_release 5.14.0-503.16.1.el9_5
|
%define tarfile_release 5.14.0-503.19.1.el9_5
|
||||||
# This is needed to do merge window version magic
|
# This is needed to do merge window version magic
|
||||||
%define patchlevel 14
|
%define patchlevel 14
|
||||||
# This allows pkg_release to have configurable %%{?dist} tag
|
# This allows pkg_release to have configurable %%{?dist} tag
|
||||||
%define specrelease 503.16.1%{?buildid}%{?dist}
|
%define specrelease 503.19.1%{?buildid}%{?dist}
|
||||||
# This defines the kabi tarball version
|
# This defines the kabi tarball version
|
||||||
%define kabiversion 5.14.0-503.16.1.el9_5
|
%define kabiversion 5.14.0-503.19.1.el9_5
|
||||||
|
|
||||||
#
|
#
|
||||||
# End of genspec.sh variables
|
# End of genspec.sh variables
|
||||||
@ -646,6 +646,9 @@ Requires: kernel-modules-core-uname-r = %{KVERREL}
|
|||||||
Provides: installonlypkg(kernel)
|
Provides: installonlypkg(kernel)
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
Provides: oracle(kernel-sig-key) == 202204
|
||||||
|
Conflicts: shim-ia32 <= 15.3-1.0.5.el9
|
||||||
|
Conflicts: shim-x64 <= 15.3-1.0.5.el9
|
||||||
|
|
||||||
#
|
#
|
||||||
# List the packages used during the kernel build
|
# List the packages used during the kernel build
|
||||||
@ -794,8 +797,6 @@ BuildRequires: WALinuxAgent-cvm
|
|||||||
# For UKI sb cert
|
# For UKI sb cert
|
||||||
%if 0%{?centos}
|
%if 0%{?centos}
|
||||||
BuildRequires: centos-sb-certs >= 9.0-23
|
BuildRequires: centos-sb-certs >= 9.0-23
|
||||||
%else
|
|
||||||
BuildRequires: redhat-sb-certs >= 9.4-0.1
|
|
||||||
%endif
|
%endif
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
@ -812,30 +813,10 @@ Source2: kernel.changelog
|
|||||||
|
|
||||||
%if %{signkernel}
|
%if %{signkernel}
|
||||||
|
|
||||||
# Name of the packaged file containing signing key
|
|
||||||
%ifarch ppc64le
|
|
||||||
%define signing_key_filename kernel-signing-ppc.cer
|
|
||||||
%endif
|
|
||||||
%ifarch s390x
|
|
||||||
%define signing_key_filename kernel-signing-s390.cer
|
|
||||||
%endif
|
|
||||||
|
|
||||||
%define secureboot_ca_0 %{_datadir}/pki/sb-certs/secureboot-ca-%{_arch}.cer
|
%define secureboot_ca_0 %{_datadir}/pki/sb-certs/secureboot-ca-%{_arch}.cer
|
||||||
%define secureboot_key_0 %{_datadir}/pki/sb-certs/secureboot-kernel-%{_arch}.cer
|
%define secureboot_key_0 %{_datadir}/pki/sb-certs/secureboot-kernel-%{_arch}.cer
|
||||||
|
|
||||||
%if 0%{?centos}
|
%define pesign_name_0 OracleSecureBootkernelsigningkey2
|
||||||
%define pesign_name_0 centossecureboot201
|
|
||||||
%else
|
|
||||||
%ifarch x86_64 aarch64
|
|
||||||
%define pesign_name_0 redhatsecureboot501
|
|
||||||
%endif
|
|
||||||
%ifarch s390x
|
|
||||||
%define pesign_name_0 redhatsecureboot302
|
|
||||||
%endif
|
|
||||||
%ifarch ppc64le
|
|
||||||
%define pesign_name_0 redhatsecureboot701
|
|
||||||
%endif
|
|
||||||
%endif
|
|
||||||
|
|
||||||
# signkernel
|
# signkernel
|
||||||
%endif
|
%endif
|
||||||
@ -920,14 +901,20 @@ Source102: rhelimaca1.x509
|
|||||||
Source103: rhelima.x509
|
Source103: rhelima.x509
|
||||||
Source104: rhelima_centos.x509
|
Source104: rhelima_centos.x509
|
||||||
Source105: nvidiagpuoot001.x509
|
Source105: nvidiagpuoot001.x509
|
||||||
|
# Oracle Linux IMA CA certificate
|
||||||
|
Source106: olimaca1.x509
|
||||||
|
# Oracle Linux IMA signing certificate
|
||||||
|
Source107: olima1.x509
|
||||||
|
|
||||||
%if 0%{?centos}
|
%if 0%{?centos}
|
||||||
%define ima_signing_cert %{SOURCE104}
|
%define ima_signing_cert %{SOURCE104}
|
||||||
%else
|
%else
|
||||||
%define ima_signing_cert %{SOURCE103}
|
%define ima_signing_cert %{SOURCE103}
|
||||||
|
%define ima_signing_cert_ol %{SOURCE107}
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%define ima_cert_name ima.cer
|
%define ima_cert_name ima.cer
|
||||||
|
%define ima_cert_name_ol ima_ol.cer
|
||||||
|
|
||||||
Source150: dracut-virt.conf
|
Source150: dracut-virt.conf
|
||||||
|
|
||||||
@ -967,6 +954,9 @@ Source4000: README.rst
|
|||||||
Source4001: rpminspect.yaml
|
Source4001: rpminspect.yaml
|
||||||
Source4002: gating.yaml
|
Source4002: gating.yaml
|
||||||
|
|
||||||
|
# Oracle Linux RHCK Module Signing Key
|
||||||
|
Source5001: olkmod_signing_key.pem
|
||||||
|
|
||||||
## Patches needed for building this package
|
## Patches needed for building this package
|
||||||
|
|
||||||
%if !%{nopatches}
|
%if !%{nopatches}
|
||||||
@ -974,8 +964,12 @@ Source4002: gating.yaml
|
|||||||
Patch1: patch-%{patchversion}-redhat.patch
|
Patch1: patch-%{patchversion}-redhat.patch
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
# Oracle patches
|
||||||
|
Patch1000: bug34729535-change-certified-hw-message.patch
|
||||||
|
|
||||||
# empty final patch to facilitate testing of kernel patches
|
# empty final patch to facilitate testing of kernel patches
|
||||||
Patch999999: linux-kernel-test.patch
|
Patch999999: linux-kernel-test.patch
|
||||||
|
Patch1000000: 1000-debrand-some-messages.patch
|
||||||
|
|
||||||
# END OF PATCH DEFINITIONS
|
# END OF PATCH DEFINITIONS
|
||||||
|
|
||||||
@ -1124,10 +1118,10 @@ This package provides debug information for the libperf package.
|
|||||||
%package -n kernel-tools
|
%package -n kernel-tools
|
||||||
Summary: Assortment of tools for the Linux kernel
|
Summary: Assortment of tools for the Linux kernel
|
||||||
%ifarch %{cpupowerarchs}
|
%ifarch %{cpupowerarchs}
|
||||||
Provides: cpupowerutils = 1:009-0.6.p1
|
Provides: cpupowerutils = 1:009-0.6.p1
|
||||||
Obsoletes: cpupowerutils < 1:009-0.6.p1
|
Obsoletes: cpupowerutils < 1:009-0.6.p1
|
||||||
Provides: cpufreq-utils = 1:009-0.6.p1
|
Provides: cpufreq-utils = 1:009-0.6.p1
|
||||||
Provides: cpufrequtils = 1:009-0.6.p1
|
Provides: cpufrequtils = 1:009-0.6.p1
|
||||||
Obsoletes: cpufreq-utils < 1:009-0.6.p1
|
Obsoletes: cpufreq-utils < 1:009-0.6.p1
|
||||||
Obsoletes: cpufrequtils < 1:009-0.6.p1
|
Obsoletes: cpufrequtils < 1:009-0.6.p1
|
||||||
Obsoletes: cpuspeed < 1:1.5-16
|
Obsoletes: cpuspeed < 1:1.5-16
|
||||||
@ -1148,7 +1142,7 @@ from the kernel source.
|
|||||||
Summary: Assortment of tools for the Linux kernel
|
Summary: Assortment of tools for the Linux kernel
|
||||||
Requires: kernel-tools = %{version}-%{release}
|
Requires: kernel-tools = %{version}-%{release}
|
||||||
%ifarch %{cpupowerarchs}
|
%ifarch %{cpupowerarchs}
|
||||||
Provides: cpupowerutils-devel = 1:009-0.6.p1
|
Provides: cpupowerutils-devel = 1:009-0.6.p1
|
||||||
Obsoletes: cpupowerutils-devel < 1:009-0.6.p1
|
Obsoletes: cpupowerutils-devel < 1:009-0.6.p1
|
||||||
%endif
|
%endif
|
||||||
Requires: kernel-tools-libs = %{version}-%{release}
|
Requires: kernel-tools-libs = %{version}-%{release}
|
||||||
@ -1714,6 +1708,7 @@ cp -a %{SOURCE1} .
|
|||||||
ApplyOptionalPatch patch-%{patchversion}-redhat.patch
|
ApplyOptionalPatch patch-%{patchversion}-redhat.patch
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
ApplyPatch bug34729535-change-certified-hw-message.patch
|
||||||
ApplyOptionalPatch linux-kernel-test.patch
|
ApplyOptionalPatch linux-kernel-test.patch
|
||||||
|
|
||||||
# END OF PATCH APPLICATIONS
|
# END OF PATCH APPLICATIONS
|
||||||
@ -1793,6 +1788,11 @@ openssl x509 -inform der -in %{SOURCE101} -out rhelkpatch1.pem
|
|||||||
openssl x509 -inform der -in %{SOURCE102} -out rhelimaca1.pem
|
openssl x509 -inform der -in %{SOURCE102} -out rhelimaca1.pem
|
||||||
openssl x509 -inform der -in %{SOURCE105} -out nvidiagpuoot001.pem
|
openssl x509 -inform der -in %{SOURCE105} -out nvidiagpuoot001.pem
|
||||||
cat rheldup3.pem rhelkpatch1.pem rhelimaca1.pem nvidiagpuoot001.pem > ../certs/rhel.pem
|
cat rheldup3.pem rhelkpatch1.pem rhelimaca1.pem nvidiagpuoot001.pem > ../certs/rhel.pem
|
||||||
|
# Add Oracle Linux IMA CA certificate to the kernel trusted certificates list
|
||||||
|
openssl x509 -inform der -in %{SOURCE106} -out olimaca1.pem
|
||||||
|
cat olimaca1.pem >> ../certs/rhel.pem
|
||||||
|
# Add olkmod_signing_key.pem to the kernel trusted certificates list
|
||||||
|
cat %{SOURCE5001} >> ../certs/rhel.pem
|
||||||
%if %{signkernel}
|
%if %{signkernel}
|
||||||
%ifarch s390x ppc64le
|
%ifarch s390x ppc64le
|
||||||
openssl x509 -inform der -in %{secureboot_ca_0} -out secureboot.pem
|
openssl x509 -inform der -in %{secureboot_ca_0} -out secureboot.pem
|
||||||
@ -2460,8 +2460,11 @@ BuildKernel() {
|
|||||||
%endif
|
%endif
|
||||||
SBAT=$(cat <<- EOF
|
SBAT=$(cat <<- EOF
|
||||||
linux,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
linux,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
||||||
|
linux,1,Oracle Linux,linux,$KernelVer,mailto:secalert_us@oracle.com
|
||||||
linux.$SBATsuffix,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
linux.$SBATsuffix,1,Red Hat,linux,$KernelVer,mailto:secalert@redhat.com
|
||||||
|
linux.ol,1,Oracle Linux,linux,$KernelVer,mailto:secalert_us@oracle.com
|
||||||
kernel-uki-virt.$SBATsuffix,1,Red Hat,kernel-uki-virt,$KernelVer,mailto:secalert@redhat.com
|
kernel-uki-virt.$SBATsuffix,1,Red Hat,kernel-uki-virt,$KernelVer,mailto:secalert@redhat.com
|
||||||
|
kernel-uki-virt.ol,1,Oracle Linux,kernel-uki-virt,$KernelVer,mailto:secalert_us@oracle.com
|
||||||
EOF
|
EOF
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -2487,7 +2490,7 @@ BuildKernel() {
|
|||||||
python3 %{SOURCE151} %{SOURCE152} $KernelAddonsDirOut virt %{primary_target} %{_target_cpu}
|
python3 %{SOURCE151} %{SOURCE152} $KernelAddonsDirOut virt %{primary_target} %{_target_cpu}
|
||||||
|
|
||||||
%if %{signkernel}
|
%if %{signkernel}
|
||||||
|
%if ! %{?oraclelinux}
|
||||||
%if 0%{?centos}
|
%if 0%{?centos}
|
||||||
UKI_secureboot_name=centossecureboot204
|
UKI_secureboot_name=centossecureboot204
|
||||||
%else
|
%else
|
||||||
@ -2509,6 +2512,7 @@ BuildKernel() {
|
|||||||
done
|
done
|
||||||
|
|
||||||
# signkernel
|
# signkernel
|
||||||
|
%endif
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
pushd $RPM_BUILD_ROOT
|
pushd $RPM_BUILD_ROOT
|
||||||
@ -2586,7 +2590,7 @@ BuildKernel() {
|
|||||||
# prune junk from kernel-devel
|
# prune junk from kernel-devel
|
||||||
find $RPM_BUILD_ROOT/usr/src/kernels -name ".*.cmd" -delete
|
find $RPM_BUILD_ROOT/usr/src/kernels -name ".*.cmd" -delete
|
||||||
|
|
||||||
# Red Hat UEFI Secure Boot CA cert, which can be used to authenticate the kernel
|
# UEFI Secure Boot CA cert, which can be used to authenticate the kernel
|
||||||
mkdir -p $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer
|
mkdir -p $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer
|
||||||
%if %{signkernel}
|
%if %{signkernel}
|
||||||
install -m 0644 %{secureboot_ca_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
install -m 0644 %{secureboot_ca_0} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/kernel-signing-ca.cer
|
||||||
@ -2600,6 +2604,8 @@ BuildKernel() {
|
|||||||
%if 0%{?rhel}
|
%if 0%{?rhel}
|
||||||
# Red Hat IMA code-signing cert, which is used to authenticate package files
|
# Red Hat IMA code-signing cert, which is used to authenticate package files
|
||||||
install -m 0644 %{ima_signing_cert} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{ima_cert_name}
|
install -m 0644 %{ima_signing_cert} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{ima_cert_name}
|
||||||
|
# Oracle Linux IMA signing cert
|
||||||
|
install -m 0644 %{ima_signing_cert_ol} $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/%{ima_cert_name_ol}
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%if %{signmodules}
|
%if %{signmodules}
|
||||||
@ -3792,6 +3798,62 @@ fi
|
|||||||
#
|
#
|
||||||
#
|
#
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Jan 06 2025 Darren Archibald <darren.archibald@oracle.com> [5.14.0-503.19.1.el9_5.OL9]
|
||||||
|
- Disable UKI signing [Orabug: 36571828]
|
||||||
|
- Update Oracle Linux certificates (Kevin Lyons)
|
||||||
|
- Disable signing for aarch64 (Ilya Okomin)
|
||||||
|
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
|
||||||
|
- Update x509.genkey [Orabug: 24817676]
|
||||||
|
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5.el9
|
||||||
|
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
|
||||||
|
- Add Oracle Linux IMA certificates
|
||||||
|
|
||||||
|
* Fri Dec 06 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.19.1.el9_5]
|
||||||
|
- xfrm: validate new SA's prefixlen using SA family when sel.family is unset (Sabrina Dubroca) [RHEL-66462 RHEL-66461] {CVE-2024-50142}
|
||||||
|
- xfrm: fix one more kernel-infoleak in algo dumping (CKI Backport Bot) [RHEL-65960] {CVE-2024-50110}
|
||||||
|
- Revert "Merge: [qed] softlockup triggered by ethtool -d [rhel-9.5.z]" (Lucas Zampieri) [RHEL-61705]
|
||||||
|
- tracing/hwlat: Fix a race during cpuhp processing (Tomas Glozar) [RHEL-69468]
|
||||||
|
- tracing/timerlat: Fix a race during cpuhp processing (Tomas Glozar) [RHEL-69468] {CVE-2024-49866}
|
||||||
|
- tracing/timerlat: Drop interface_lock in stop_kthread() (Tomas Glozar) [RHEL-69468]
|
||||||
|
- tracing/timerlat: Fix duplicated kthread creation due to CPU online/offline (Tomas Glozar) [RHEL-69468]
|
||||||
|
- ceph: remove the incorrect Fw reference check when dirtying pages (Xiubo Li) [RHEL-61416 RHEL-60255]
|
||||||
|
|
||||||
|
* Tue Dec 03 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.18.1.el9_5]
|
||||||
|
- bpf: Fix a kernel verifier crash in stacksafe() (CKI Backport Bot) [RHEL-66097 RHEL-66098] {CVE-2024-45020}
|
||||||
|
- bpf: Fix a sdiv overflow issue (CKI Backport Bot) [RHEL-64598 RHEL-64597] {CVE-2024-49888}
|
||||||
|
- bpf: Fix out-of-bounds write in trie_get_next_key() (CKI Backport Bot) [RHEL-66877] {CVE-2024-50262}
|
||||||
|
- bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (CKI Backport Bot) [RHEL-63331] {CVE-2024-47675}
|
||||||
|
- nfsd: ensure that nfsd4_fattr_args.context is zeroed out (Jay Shin) [RHEL-58884 RHEL-58883] {CVE-2024-46697}
|
||||||
|
- KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (Jon Maloy) [RHEL-65872] {CVE-2024-50115}
|
||||||
|
- net: tighten bad gso csum offset check in virtio_net_hdr (Guillaume Nault) [RHEL-67683]
|
||||||
|
- udp: fix receiving fraglist GSO packets (Guillaume Nault) [RHEL-67683]
|
||||||
|
- Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (CKI Backport Bot) [RHEL-66804] {CVE-2024-50255}
|
||||||
|
- Bluetooth: ISO: Fix UAF on iso_sock_timeout (Bastien Nocera) [RHEL-66321] {CVE-2024-50124}
|
||||||
|
- Bluetooth: SCO: Fix UAF on sco_sock_timeout (Bastien Nocera) [RHEL-65928] {CVE-2024-50125}
|
||||||
|
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (Bastien Nocera) [RHEL-65928] {CVE-2024-27398}
|
||||||
|
- bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CKI Backport Bot) [RHEL-44173] {CVE-2024-38564}
|
||||||
|
- Bluetooth: bnep: fix wild-memory-access in proto_unregister (CKI Backport Bot) [RHEL-66365] {CVE-2024-50148}
|
||||||
|
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CKI Backport Bot) [RHEL-57716 RHEL-36374] {CVE-2024-27399}
|
||||||
|
|
||||||
|
* Thu Nov 28 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.17.1.el9_5]
|
||||||
|
- arm64: probes: Remove broken LDR (literal) uprobe support (CKI Backport Bot) [RHEL-66046] {CVE-2024-50099}
|
||||||
|
- qed: put cond_resched() in qed_dmae_operation_wait() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: allow the callee of qed_mcp_nvm_read() to sleep (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: put cond_resched() in qed_grc_dump_ctx_data() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: make 'ethtool -d' 10 times faster (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- qed: allow sleep in qed_mcp_trace_dump() (Michal Schmidt) [RHEL-61705 RHEL-6372]
|
||||||
|
- sched/numa: Fix the potential null pointer dereference in task_numa_work() (CKI Backport Bot) [RHEL-66810] {CVE-2024-50223}
|
||||||
|
- irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (Charles Mirabile) [RHEL-66969] {CVE-2024-50192}
|
||||||
|
- irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (Charles Mirabile) [RHEL-66969] {CVE-2024-50192}
|
||||||
|
- perf/x86/intel/uncore: Support HBM and CXL PMON counters (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Cleanup unused unit structure (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to PCI uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to MSR uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Retrieve the unit ID from the unit control RB tree (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Support per PMU cpumask (Michael Petlan) [RHEL-65856]
|
||||||
|
- perf/x86/uncore: Save the unit control address of all units (Michael Petlan) [RHEL-65856]
|
||||||
|
|
||||||
* Thu Nov 21 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.16.1.el9_5]
|
* Thu Nov 21 2024 Lucas Zampieri <lzampier@redhat.com> [5.14.0-503.16.1.el9_5]
|
||||||
- s390/dasd: fix error recovery leading to data corruption on ESE devices (Mete Durlu) [RHEL-64902 RHEL-55873]
|
- s390/dasd: fix error recovery leading to data corruption on ESE devices (Mete Durlu) [RHEL-64902 RHEL-55873]
|
||||||
- net/smc: fix illegal rmb_desc access in SMC-D connection dump (Steve Best) [RHEL-65436 RHEL-27748] {CVE-2024-26615}
|
- net/smc: fix illegal rmb_desc access in SMC-D connection dump (Steve Best) [RHEL-65436 RHEL-27748] {CVE-2024-26615}
|
||||||
|
Loading…
Reference in New Issue
Block a user