kernel-4.18.0-520.el8
* Fri Oct 27 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-520.el8] - kernel/rh_messages.c: move hardware tables to rh_messages.h (Scott Weaver) [2181912] - kernel/rh_messages.c: Wire up new calls (Prarit Bhargava) [2181912] - drivers/pci: Update rh_messages.c (Prarit Bhargava) [2181912] - treewide: Remove mark_driver_deprecated() (Prarit Bhargava) [2181912] - treewide: Remove mark_hardware_deprecated() (Prarit Bhargava) [2181912] - treewide: Remove mark_driver_unmaintained() (Prarit Bhargava) [2181912] - drivers/pci: Remove RHEL-only pci_hw_*() functions (Prarit Bhargava) [2181912] - treewide: Remove pci_hw_disabled() calls (Prarit Bhargava) [2181912] - treewide: Remove pci_hw_deprecated() calls (Prarit Bhargava) [2181912] - treewide: Remove pci_hw_unmaintained() calls (Prarit Bhargava) [2181912] - redhat: fix bug/zjira sort in the changelog (Patrick Talbert) - blk-mq: enforce op-specific segment limits in blk_insert_cloned_request (Ming Lei) [RHEL-14504] - tunnels: fix kasan splat when generating ipv4 pmtu error (Guillaume Nault) [RHEL-14377] - net:ipv6: check return value of pskb_trim() (Guillaume Nault) [RHEL-14377] - sit: update dev->needed_headroom in ipip6_tunnel_bind_dev() (Guillaume Nault) [RHEL-14377] - ipv4: fix null-deref in ipv4_link_failure (Felix Maurer) [RHEL-5427] {CVE-2023-42754} - powerpc/perf/hv-24x7: Update domain value check (Michael Petlan) [RHEL-13718] - vxlan: Expose helper vxlan_build_gbp_hdr (Izabela Bakollari) [RHEL-12413] - vxlan: Remove unused argument from vxlan_build_gbp_hdr( ) and vxlan_build_gpe_hdr( ) (Izabela Bakollari) [RHEL-12413] - net: ipv4: fix one memleak in __inet_del_ifa() (Guillaume Nault) [RHEL-14375] - ipv4: Fix potential uninit variable access bug in __ip_make_skb() (Guillaume Nault) [RHEL-14375] - icmp: guard against too small mtu (Guillaume Nault) [RHEL-14375] - ipv6: ping: fix wrong checksum for large frames (Guillaume Nault) [RHEL-14375] - net: ipv6/addrconf: avoid integer underflow in ipv6_create_tempaddr (Hangbin Liu) [RHEL-13954] - ip6mr: Fix skb_under_panic in ip6mr_cache_report() (Hangbin Liu) [RHEL-13954] - ipv6 addrconf: fix bug where deleting a mngtmpaddr can create a new temporary address (Hangbin Liu) [RHEL-13954] - ipv6/addrconf: fix a potential refcount underflow for idev (Hangbin Liu) [RHEL-13954] - icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev(). (Hangbin Liu) [RHEL-13954] - ping6: Fix send to link-local addresses with VRF. (Hangbin Liu) [RHEL-13954] - ipv6: Fix out-of-bounds access in ipv6_find_tlv() (Hangbin Liu) [RHEL-13954] Resolves: rhbz#2181912, RHEL-12413, RHEL-13718, RHEL-13954, RHEL-14375, RHEL-14377, RHEL-14504, RHEL-5427 Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
This commit is contained in:
parent
6695496f0a
commit
5c6d479d79
38
kernel.spec
38
kernel.spec
@ -12,7 +12,7 @@
|
|||||||
# change below to w4T.xzdio):
|
# change below to w4T.xzdio):
|
||||||
%define _binary_payload w3T.xzdio
|
%define _binary_payload w3T.xzdio
|
||||||
|
|
||||||
%global distro_build 519
|
%global distro_build 520
|
||||||
|
|
||||||
# Sign the x86_64 kernel for secure boot authentication
|
# Sign the x86_64 kernel for secure boot authentication
|
||||||
%ifarch x86_64 aarch64 s390x ppc64le
|
%ifarch x86_64 aarch64 s390x ppc64le
|
||||||
@ -38,10 +38,10 @@
|
|||||||
# define buildid .local
|
# define buildid .local
|
||||||
|
|
||||||
%define specversion 4.18.0
|
%define specversion 4.18.0
|
||||||
%define pkgrelease 519.el8
|
%define pkgrelease 520.el8
|
||||||
|
|
||||||
# allow pkg_release to have configurable %%{?dist} tag
|
# allow pkg_release to have configurable %%{?dist} tag
|
||||||
%define specrelease 519%{?dist}
|
%define specrelease 520%{?dist}
|
||||||
|
|
||||||
%define pkg_release %{specrelease}%{?buildid}
|
%define pkg_release %{specrelease}%{?buildid}
|
||||||
|
|
||||||
@ -2695,6 +2695,38 @@ fi
|
|||||||
#
|
#
|
||||||
#
|
#
|
||||||
%changelog
|
%changelog
|
||||||
|
* Fri Oct 27 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-520.el8]
|
||||||
|
- kernel/rh_messages.c: move hardware tables to rh_messages.h (Scott Weaver) [2181912]
|
||||||
|
- kernel/rh_messages.c: Wire up new calls (Prarit Bhargava) [2181912]
|
||||||
|
- drivers/pci: Update rh_messages.c (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove mark_driver_deprecated() (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove mark_hardware_deprecated() (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove mark_driver_unmaintained() (Prarit Bhargava) [2181912]
|
||||||
|
- drivers/pci: Remove RHEL-only pci_hw_*() functions (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove pci_hw_disabled() calls (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove pci_hw_deprecated() calls (Prarit Bhargava) [2181912]
|
||||||
|
- treewide: Remove pci_hw_unmaintained() calls (Prarit Bhargava) [2181912]
|
||||||
|
- redhat: fix bug/zjira sort in the changelog (Patrick Talbert)
|
||||||
|
- blk-mq: enforce op-specific segment limits in blk_insert_cloned_request (Ming Lei) [RHEL-14504]
|
||||||
|
- tunnels: fix kasan splat when generating ipv4 pmtu error (Guillaume Nault) [RHEL-14377]
|
||||||
|
- net:ipv6: check return value of pskb_trim() (Guillaume Nault) [RHEL-14377]
|
||||||
|
- sit: update dev->needed_headroom in ipip6_tunnel_bind_dev() (Guillaume Nault) [RHEL-14377]
|
||||||
|
- ipv4: fix null-deref in ipv4_link_failure (Felix Maurer) [RHEL-5427] {CVE-2023-42754}
|
||||||
|
- powerpc/perf/hv-24x7: Update domain value check (Michael Petlan) [RHEL-13718]
|
||||||
|
- vxlan: Expose helper vxlan_build_gbp_hdr (Izabela Bakollari) [RHEL-12413]
|
||||||
|
- vxlan: Remove unused argument from vxlan_build_gbp_hdr( ) and vxlan_build_gpe_hdr( ) (Izabela Bakollari) [RHEL-12413]
|
||||||
|
- net: ipv4: fix one memleak in __inet_del_ifa() (Guillaume Nault) [RHEL-14375]
|
||||||
|
- ipv4: Fix potential uninit variable access bug in __ip_make_skb() (Guillaume Nault) [RHEL-14375]
|
||||||
|
- icmp: guard against too small mtu (Guillaume Nault) [RHEL-14375]
|
||||||
|
- ipv6: ping: fix wrong checksum for large frames (Guillaume Nault) [RHEL-14375]
|
||||||
|
- net: ipv6/addrconf: avoid integer underflow in ipv6_create_tempaddr (Hangbin Liu) [RHEL-13954]
|
||||||
|
- ip6mr: Fix skb_under_panic in ip6mr_cache_report() (Hangbin Liu) [RHEL-13954]
|
||||||
|
- ipv6 addrconf: fix bug where deleting a mngtmpaddr can create a new temporary address (Hangbin Liu) [RHEL-13954]
|
||||||
|
- ipv6/addrconf: fix a potential refcount underflow for idev (Hangbin Liu) [RHEL-13954]
|
||||||
|
- icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev(). (Hangbin Liu) [RHEL-13954]
|
||||||
|
- ping6: Fix send to link-local addresses with VRF. (Hangbin Liu) [RHEL-13954]
|
||||||
|
- ipv6: Fix out-of-bounds access in ipv6_find_tlv() (Hangbin Liu) [RHEL-13954]
|
||||||
|
|
||||||
* Tue Oct 24 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-519.el8]
|
* Tue Oct 24 2023 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-519.el8]
|
||||||
- redhat: remove kabi-rhel810 directory (Prarit Bhargava)
|
- redhat: remove kabi-rhel810 directory (Prarit Bhargava)
|
||||||
- redhat: Update .gitignore for 8.10 kabi files (Prarit Bhargava)
|
- redhat: Update .gitignore for 8.10 kabi files (Prarit Bhargava)
|
||||||
|
6
sources
6
sources
@ -1,3 +1,3 @@
|
|||||||
SHA512 (linux-4.18.0-519.el8.tar.xz) = cce0600d6ace3ef75c404e49e251151654ea1e970e4fb28c0012f8521846014dc5ead91607cbb01e09eb5038adf62736fb9eb892731822ce3c4c7c8d725f9d4b
|
SHA512 (linux-4.18.0-520.el8.tar.xz) = 15226f1b0e341d6dde9a35f6d70c20e842d96ecdafaa882fc933e3ab32b9f4dd6f66ae715a468b389995580ec4ca4204540496d838dfa2ad1438ea4c9209d905
|
||||||
SHA512 (kernel-abi-stablelists-4.18.0-519.tar.bz2) = d4a307298a1712149f060d74fb684b24410526017f68294f85875d1131a321090815b6a4df2463a3a039db78012c7cd14dd454d849aadb59d27e76a39315c2e6
|
SHA512 (kernel-abi-stablelists-4.18.0-520.tar.bz2) = a540e06a18c1400aaf247e72290ffcefcb039f81919bd7abe976d28e9aea8755d13a56a36ad4d6c39992b3ba8ea4e1dddd1240724afa72e988dccd8a4c10ac72
|
||||||
SHA512 (kernel-kabi-dw-4.18.0-519.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32
|
SHA512 (kernel-kabi-dw-4.18.0-520.tar.bz2) = f7bbf94096acc33486535d9eece268c543c6a05d93ee262d64dc22b220f1cb3ff49b4cf091a5c748811c4229fdf674be4c816174575161b0ca5e457726595b32
|
||||||
|
Loading…
Reference in New Issue
Block a user