kernel-4.18.0-553.4.1.el8_10
* Wed May 15 2024 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.4.1.el8_10] - cpuhotplug: Fix kABI breakage caused by CPUHP_AP_HYPERV_ONLINE (Vitaly Kuznetsov) [RHEL-36117] - net/mlx5e: Prevent deadlock while disabling aRFS (Kamal Heib) [RHEL-35041] {CVE-2024-27014} - x86/tsc: Defer marking TSC unstable to a worker (Wander Lairson Costa) [RHEL-32676] - x86/smpboot: Make TSC synchronization function call based (Wander Lairson Costa) [RHEL-32676] - net: usb: fix possible use-after-free in smsc75xx_bind (Jose Ignacio Tornos Martinez) [RHEL-30311] {CVE-2021-47171} - net: usb: fix memory leak in smsc75xx_bind (Jose Ignacio Tornos Martinez) [RHEL-30311] {CVE-2021-47171} Resolves: RHEL-30311, RHEL-32676, RHEL-35041, RHEL-36117 Signed-off-by: Denys Vlasenko <dvlasenk@redhat.com>
This commit is contained in:
parent
42a083e861
commit
9fc0a7e3c8
14
kernel.spec
14
kernel.spec
@ -12,7 +12,7 @@
|
|||||||
# change below to w4T.xzdio):
|
# change below to w4T.xzdio):
|
||||||
%define _binary_payload w3T.xzdio
|
%define _binary_payload w3T.xzdio
|
||||||
|
|
||||||
%global distro_build 552
|
%global distro_build 553
|
||||||
|
|
||||||
# Sign the x86_64 kernel for secure boot authentication
|
# Sign the x86_64 kernel for secure boot authentication
|
||||||
%ifarch x86_64 aarch64 s390x ppc64le
|
%ifarch x86_64 aarch64 s390x ppc64le
|
||||||
@ -38,10 +38,10 @@
|
|||||||
# define buildid .local
|
# define buildid .local
|
||||||
|
|
||||||
%define specversion 4.18.0
|
%define specversion 4.18.0
|
||||||
%define pkgrelease 552.3.1.el8_10
|
%define pkgrelease 553.4.1.el8_10
|
||||||
|
|
||||||
# allow pkg_release to have configurable %%{?dist} tag
|
# allow pkg_release to have configurable %%{?dist} tag
|
||||||
%define specrelease 552.3.1%{?dist}
|
%define specrelease 553.4.1%{?dist}
|
||||||
|
|
||||||
%define pkg_release %{specrelease}%{?buildid}
|
%define pkg_release %{specrelease}%{?buildid}
|
||||||
|
|
||||||
@ -2696,6 +2696,14 @@ fi
|
|||||||
#
|
#
|
||||||
#
|
#
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed May 15 2024 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-553.4.1.el8_10]
|
||||||
|
- cpuhotplug: Fix kABI breakage caused by CPUHP_AP_HYPERV_ONLINE (Vitaly Kuznetsov) [RHEL-36117]
|
||||||
|
- net/mlx5e: Prevent deadlock while disabling aRFS (Kamal Heib) [RHEL-35041] {CVE-2024-27014}
|
||||||
|
- x86/tsc: Defer marking TSC unstable to a worker (Wander Lairson Costa) [RHEL-32676]
|
||||||
|
- x86/smpboot: Make TSC synchronization function call based (Wander Lairson Costa) [RHEL-32676]
|
||||||
|
- net: usb: fix possible use-after-free in smsc75xx_bind (Jose Ignacio Tornos Martinez) [RHEL-30311] {CVE-2021-47171}
|
||||||
|
- net: usb: fix memory leak in smsc75xx_bind (Jose Ignacio Tornos Martinez) [RHEL-30311] {CVE-2021-47171}
|
||||||
|
|
||||||
* Sat May 11 2024 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-552.3.1.el8_10]
|
* Sat May 11 2024 Denys Vlasenko <dvlasenk@redhat.com> [4.18.0-552.3.1.el8_10]
|
||||||
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (Phil Sutter) [RHEL-30076] {CVE-2024-26643}
|
- netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (Phil Sutter) [RHEL-30076] {CVE-2024-26643}
|
||||||
- netfilter: nf_tables: disallow anonymous set with timeout flag (Phil Sutter) [RHEL-30080] {CVE-2024-26642}
|
- netfilter: nf_tables: disallow anonymous set with timeout flag (Phil Sutter) [RHEL-30080] {CVE-2024-26642}
|
||||||
|
6
sources
6
sources
@ -1,3 +1,3 @@
|
|||||||
SHA512 (linux-4.18.0-552.3.1.el8_10.tar.xz) = fbed707fb8c6429f8fd47b5c099bda1f0c69c35505dcf72510fd040ef53a470256e16c796031dcc036f1f802876bfc9ac9f340c6788586f241bf173b5d63e0a9
|
SHA512 (linux-4.18.0-553.4.1.el8_10.tar.xz) = 69d0102f5895e8d5ef8333ff40c718e63a5f6d46e3784c3a8d6ccdaf137fa1578990775b54cdea303ad7809aa57cb015fda5c0db72946fe9bc7e23da7b75ecc2
|
||||||
SHA512 (kernel-abi-stablelists-4.18.0-552.tar.bz2) = d9f510314ddd07fb118aac5bf66e9af5613d0bbce0e07618e45510d66a4161aa69b0405391b6f309461563ff7f9f374ce69dff61bd7839a15bdacd914ae332b7
|
SHA512 (kernel-abi-stablelists-4.18.0-553.tar.bz2) = 541ecefa7ae6f4e9abbd3ba4e4906140564827ecfbe310d772272edd0bf8982ace5ac6e1969187e75b2f365b99978547bb4a0d8b3e6df445a4087aeb14bede0a
|
||||||
SHA512 (kernel-kabi-dw-4.18.0-552.tar.bz2) = 8a671ed3c9b7f4b25fd4e594b62bc4a26474cb705d3ed22ca376618b3c7962fc72ace1ffd02c9c3a192d9d2c449d38228809542d7f16ebad16f8127020eb2faf
|
SHA512 (kernel-kabi-dw-4.18.0-553.tar.bz2) = 8a671ed3c9b7f4b25fd4e594b62bc4a26474cb705d3ed22ca376618b3c7962fc72ace1ffd02c9c3a192d9d2c449d38228809542d7f16ebad16f8127020eb2faf
|
||||||
|
Loading…
Reference in New Issue
Block a user