diff --git a/download b/download index c16e94e87d4e28cfdc3690d24d2de00d1148f208..a3bb8f2c804faaff42adb39f9492bca93982b880 100644 --- a/download +++ b/download @@ -1,3 +1,3 @@ -1ac43c54b7753109d797ddd0db655bde kernel-abi-stablelists-4.18.0-553.tar.bz2 +d029616e4dee467c9597e0593706e62b kernel-abi-stablelists-4.18.0-553.tar.bz2 dacb6c59855053065f7f64fcfb9aa828 kernel-kabi-dw-4.18.0-553.tar.bz2 -fa039f9a4a98f6caced87d9f0fac8906 linux-4.18.0-553.58.1.el8_10.tar.xz +3ff977a1a488eb8ce11d8b3f9de1bf94 linux-4.18.0-553.62.1.el8_10.tar.xz diff --git a/kernel.spec b/kernel.spec index 13cd6295c13d72212954a19b2f763fba87f785b1..8e658d30539c8c2312f3340c9cc042519ce1a377 100644 --- a/kernel.spec +++ b/kernel.spec @@ -39,10 +39,10 @@ # define buildid .local %define specversion 4.18.0 -%define pkgrelease 553.58.1.el8_10 +%define pkgrelease 553.62.1.el8_10 # allow pkg_release to have configurable %%{?dist} tag -%define specrelease 553.58.1%{anolis_release}%{?dist} +%define specrelease 553.62.1%{anolis_release}%{?dist} %define pkg_release %{specrelease}%{?buildid} @@ -2699,9 +2699,70 @@ fi # # %changelog -* Mon Jul 07 2025 Xiaoping Liu - 4.18.0-553.58.1.0.1 +* Thu Jul 17 2025 Xiaoping Liu - 4.18.0-553.62.1.0.1 - kernel:repair dwarves causes kernel compilation to fail +* Thu Jul 10 2025 Denys Vlasenko [4.18.0-553.62.1.el8_10] +- s390/virtio_ccw: Don't allocate/assign airqs for non-existing queues (David Hildenbrand) [RHEL-87557] +- mm/slab: make __free(kfree) accept error pointers (Mark Langsdorf) [RHEL-84410] +- driver core: fix potential NULL pointer dereference in dev_uevent() (Mark Langsdorf) [RHEL-84410] +- driver core: introduce device_set_driver() helper (Mark Langsdorf) [RHEL-84410] +- Revert "drivers: core: synchronize really_probe() and dev_uevent()" (Mark Langsdorf) [RHEL-84410] +- cleanup: Add conditional guard helper (Mark Langsdorf) [RHEL-84410] +- cleanup: Adjust scoped_guard() macros to avoid potential warning (Mark Langsdorf) [RHEL-84410] +- cleanup: Remove address space of returned pointer (Mark Langsdorf) [RHEL-84410] +- cleanup: Add usage and style documentation (Mark Langsdorf) [RHEL-84410] +- file: add take_fd() cleanup helper (Mark Langsdorf) [RHEL-84410] +- cleanup: Standardize the header guard define's name (Mark Langsdorf) [RHEL-84410] +- cleanup: Add conditional guard support (Mark Langsdorf) [RHEL-84410] +- cleanup: Make no_free_ptr() __must_check (Mark Langsdorf) [RHEL-84410] +- locking: Introduce __cleanup() based infrastructure (Mark Langsdorf) [RHEL-84410] +- misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CKI Backport Bot) [RHEL-100343] {CVE-2022-49788} +- media: uvcvideo: Announce the user our deprecation intentions (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Allow changing noparam on the fly (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Invert default value for nodrop module param (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Propagate buf->error to userspace (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Flush the control cache when we get an event (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Annotate lock requirements for uvc_ctrl_set (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Remove dangling pointers (Desnes Nunes) [RHEL-98760] {CVE-2024-58002} +- media: uvcvideo: Remove redundant NULL assignment (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Only save async fh if success (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Refactor iterators (Desnes Nunes) [RHEL-98760] +- media: uvcvideo: Fix double free in error path (CKI Backport Bot) [RHEL-98788] {CVE-2024-57980} +- cifs: potential buffer overflow in handling symlinks (Paulo Alcantara) [RHEL-97074] {CVE-2022-49058} +- Race between reading mdstat and stopping an md device (Nigel Croxon) [RHEL-95723] +- fs/dcache: Control # of dentries in list_lru_node (Waiman Long) [RHEL-8578] +- fs/dcache: Add sysctl parameter dentry-fs-klimit to control # of dentries in filesystem (Waiman Long) [RHEL-8578] +- mm/list_lru: Make list_lru_add() return # if items in affected list_lru_node (Waiman Long) [RHEL-8578] + +* Thu Jul 03 2025 Denys Vlasenko [4.18.0-553.61.1.el8_10] +- s390: Add z17 elf platform (Christoph Schlameuss) [RHEL-100409] +- ext4: ignore xattrs past end (CKI Backport Bot) [RHEL-100375] {CVE-2025-37738} +- ext4: fix off-by-one error in do_split (CKI Backport Bot) [RHEL-100361] {CVE-2025-23150} +- net: atm: fix use after free in lec_send() (CKI Backport Bot) [RHEL-93119] {CVE-2025-22004} +- x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CKI Backport Bot) [RHEL-98980] {CVE-2025-21991} + +* Thu Jun 26 2025 Denys Vlasenko [4.18.0-553.60.1.el8_10] +- xfs: don't allocate COW extents when unsharing a hole (Brian Foster) [RHEL-83037] +- xfs: don't allocate into the data fork for an unshare request (Brian Foster) [RHEL-83037] +- s390/ism: add release function for struct device (Mete Durlu) [RHEL-97192] +- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CKI Backport Bot) [RHEL-99113] {CVE-2022-49846} + +* Thu Jun 19 2025 Denys Vlasenko [4.18.0-553.59.1.el8_10] +- SUNRPC: Fix Oops in xs_tcp_send_request() when transport is disconnected (Olga Kornievskaia) [RHEL-83291] +- SUNRPC: Set TCP_CORK until the transmit queue is empty (Olga Kornievskaia) [RHEL-83291] +- tcp: add tcp_sock_set_cork (Olga Kornievskaia) [RHEL-83291] +- xfs: xfs_ail_push_all_sync() stalls when racing with updates (Brian Foster) [RHEL-88132] +- Bluetooth: Fix use after free in hci_send_acl (CKI Backport Bot) [RHEL-90428] {CVE-2022-49111} +- Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID (David Marlin) [RHEL-90468] {CVE-2022-49136} +- Bluetooth: hci_sync: add lock to protect HCI_UNREGISTER (David Marlin) [RHEL-90468] {CVE-2022-49136} +- Bluetooth: hci_sync: Only allow hci_cmd_sync_queue if running (David Marlin) [RHEL-90468] {CVE-2022-49136} +- Bluetooth: Cancel sync command before suspend and power off (David Marlin) [RHEL-90468] {CVE-2022-49136} +- Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set (CKI Backport Bot) [RHEL-90468] {CVE-2022-49136} +- fix backport of "filelock: Remove locks reliably when fcntl/close race is detected" (Scott Mayhew) [RHEL-89709] +- NFSv4: Allow FREE_STATEID to clean up delegations (Benjamin Coddington) [RHEL-86932] +- NFSv4.1: constify the stateid argument in nfs41_test_stateid() (Trond Myklebust) [RHEL-86932] + * Thu Jun 12 2025 Denys Vlasenko [4.18.0-553.58.1.el8_10] - ndisc: use RCU protection in ndisc_alloc_skb() (Xin Long) [RHEL-89535] {CVE-2025-21764} - ipv6: use RCU protection in ip6_default_advmss() (Xin Long) [RHEL-89535] {CVE-2025-21765}