hpsa: bring back deprecated PCI ids #CFHack #CFHack2024

mptsas: bring back deprecated PCI ids #CFHack #CFHack2024

megaraid_sas: bring back deprecated PCI ids #CFHack #CFHack2024

qla2xxx: bring back deprecated PCI ids #CFHack #CFHack2024

qla4xxx: bring back deprecated PCI ids

lpfc: bring back deprecated PCI ids

be2iscsi: bring back deprecated PCI ids

kernel/rh_messages.h: enable all disabled pci devices by moving to unmaintained

Use AlmaLinux OS secure boot cert

Debrand for AlmaLinux OS
This commit is contained in:
Andrew Lukoshko 2026-01-19 09:11:11 +00:00 committed by root
commit 8dddfc9e46
3 changed files with 18 additions and 8 deletions

2
.gitignore vendored
View File

@ -2,7 +2,7 @@ SOURCES/centossecureboot201.cer
SOURCES/centossecurebootca2.cer
SOURCES/kernel-abi-stablelists-4.18.0-553.tar.bz2
SOURCES/kernel-kabi-dw-4.18.0-553.tar.bz2
SOURCES/linux-4.18.0-553.92.1.el8_10.tar.xz
SOURCES/linux-4.18.0-553.94.1.el8_10.tar.xz
SOURCES/redhatsecureboot302.cer
SOURCES/redhatsecureboot303.cer
SOURCES/redhatsecureboot501.cer

View File

@ -1,8 +1,8 @@
2ba40bf9138b48311e5aa1b737b7f0a8ad66066f SOURCES/centossecureboot201.cer
bfdb3d7cffc43f579655af5155d50c08671d95e5 SOURCES/centossecurebootca2.cer
893271a50b6947df0b4ec8d08ee984c1e0f1bf14 SOURCES/kernel-abi-stablelists-4.18.0-553.tar.bz2
cd2142606c7568a31beaa8a562de2bb295319354 SOURCES/kernel-kabi-dw-4.18.0-553.tar.bz2
2a83ad64c516d2a2a6531f2d0707a9f4221a2237 SOURCES/linux-4.18.0-553.92.1.el8_10.tar.xz
2e076f273a1f85430aee9a8d007982f1e6747a8d SOURCES/kernel-abi-stablelists-4.18.0-553.tar.bz2
250ca8e8a402aaf41fcff6a39bf52760b6c67164 SOURCES/kernel-kabi-dw-4.18.0-553.tar.bz2
9c8b609ecedef26271c785493ce6b1c614435ed3 SOURCES/linux-4.18.0-553.94.1.el8_10.tar.xz
13e5cd3f856b472fde80a4deb75f4c18dfb5b255 SOURCES/redhatsecureboot302.cer
e89890ca0ded2f9058651cc5fa838b78db2e6cc2 SOURCES/redhatsecureboot303.cer
ba0b760e594ff668ee72ae348adf3e49b97f75fb SOURCES/redhatsecureboot501.cer

View File

@ -38,10 +38,10 @@
# define buildid .local
%define specversion 4.18.0
%define pkgrelease 553.92.1.el8_10
%define pkgrelease 553.94.1.el8_10
# allow pkg_release to have configurable %%{?dist} tag
%define specrelease 553.92.1%{?dist}
%define specrelease 553.94.1%{?dist}
%define pkg_release %{specrelease}%{?buildid}
@ -2718,7 +2718,7 @@ fi
#
#
%changelog
* Wed Jan 14 2026 Andrei Lukoshko <alukoshko@almalinux.org> - 4.18.0-553.92.1
* Mon Jan 19 2026 Andrei Lukoshko <alukoshko@almalinux.org> - 4.18.0-553.94.1
- hpsa: bring back deprecated PCI ids #CFHack #CFHack2024
- mptsas: bring back deprecated PCI ids #CFHack #CFHack2024
- megaraid_sas: bring back deprecated PCI ids #CFHack #CFHack2024
@ -2729,10 +2729,20 @@ fi
- kernel/rh_messages.h: enable all disabled pci devices by moving to
unmaintained
* Wed Jan 14 2026 Eduard Abdullin <eabdullin@almalinux.org> - 4.18.0-553.92.1
* Mon Jan 19 2026 Eduard Abdullin <eabdullin@almalinux.org> - 4.18.0-553.94.1
- Use AlmaLinux OS secure boot cert
- Debrand for AlmaLinux OS
* Tue Jan 13 2026 CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> [4.18.0-553.94.1.el8_10]
- net: atlantic: fix fragment overflow handling in RX path (CKI Backport Bot) [RHEL-139482] {CVE-2025-68301}
- smb: client: let recv_done verify data_offset, data_length and remaining_data_length (Paulo Alcantara) [RHEL-131387] {CVE-2025-39933}
- smb: client: Fix use-after-free in cifs_fill_dirent (CKI Backport Bot) [RHEL-134369] {CVE-2025-38051}
* Thu Jan 08 2026 CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> [4.18.0-553.93.1.el8_10]
- mm: compaction: update the COMPACT[STALL|FAIL] events properly (Lucas Oakley) [RHEL-132449]
- drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (Mika Penttilä) [RHEL-125456] {CVE-2025-40096}
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (CKI Backport Bot) [RHEL-124682] {CVE-2023-53552}
* Tue Jan 06 2026 CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> [4.18.0-553.92.1.el8_10]
- libceph: fix potential use-after-free in have_mon_and_osd_map() (CKI Backport Bot) [RHEL-137395] {CVE-2025-68285}
- media: rc: fix races with imon_disconnect() (Kate Hsuan) [RHEL-124396] {CVE-2025-39993}