summaryrefslogtreecommitdiffstats
path: root/kernel.spec
diff options
context:
space:
mode:
authorJosh Boyer <jwboyer@redhat.com>2013-06-17 08:28:32 -0400
committerJosh Boyer <jwboyer@redhat.com>2013-06-17 08:28:32 -0400
commit542e360438cf855ace303dd5d8112ee1e0651dd7 (patch)
tree4b8a2db50fca38e6c8a81b64b3b5163fd1b283e8 /kernel.spec
parent575de6c9a6d4f8210b41bbfa4e0f482da91d959b (diff)
downloadkernel-542e360438cf855ace303dd5d8112ee1e0651dd7.tar.gz
kernel-542e360438cf855ace303dd5d8112ee1e0651dd7.tar.xz
kernel-542e360438cf855ace303dd5d8112ee1e0651dd7.zip
Linux v3.10-rc6
Diffstat (limited to 'kernel.spec')
-rw-r--r--kernel.spec31
1 files changed, 4 insertions, 27 deletions
diff --git a/kernel.spec b/kernel.spec
index 71fe323da..398637404 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -93,7 +93,7 @@ Summary: The Linux kernel
# The next upstream release sublevel (base_sublevel+1)
%define upstream_sublevel %(echo $((%{base_sublevel} + 1)))
# The rc snapshot level
-%define rcrev 5
+%define rcrev 6
# The git snapshot level
%define gitrev 0
# Set rpm version accordingly
@@ -744,9 +744,6 @@ Patch21242: criu-no-expert.patch
#rhbz 892811
Patch21247: ath9k_rx_dma_stop_check.patch
-#rhbz 903192
-Patch21261: 0001-kmsg-Honor-dmesg_restrict-sysctl-on-dev-kmsg.patch
-
Patch22000: weird-root-dentry-name-debug.patch
#selinux ptrace child permissions
@@ -758,9 +755,6 @@ Patch23006: fix-child-thread-introspection.patch
#rhbz 948262
Patch25024: intel_iommu-Downgrade-the-warning-if-enabling-irq-remapping-fails.patch
-#rhbz 964335
-Patch25026: Modify-UEFI-anti-bricking-code.patch
-
#CVE-2013-2140 rhbz 971146 971148
Patch25031: xen-blkback-Check-device-permissions-before-allowing.patch
@@ -770,19 +764,12 @@ Patch25032: cve-2013-2147-ciss-info-leak.patch
#CVE-2013-2148 rhbz 971258 971261
Patch25033: fanotify-info-leak-in-copy_event_to_user.patch
-#CVE-2013-2852 rhbz 969518 971665
-Patch25034: b43-stop-format-string-leaking-into-error-msgs.patch
-
#CVE-2013-2851 rhbz 969515 971662
Patch25035: block-do-not-pass-disk-names-as-format-strings.patch
#CVE-2013-2164 rhbz 973100 973109
Patch25038: cdrom-use-kzalloc-for-failing-hardware.patch
-#rhbz 954181
-Patch25039: vhost_net-clear-msg.control-for-non-zerocopy-case-during-tx.patch
-Patch25040: tuntap-set-SOCK_ZEROCOPY-flag-during-open.patch
-
#rhbz 973185
Patch25041: x86-mtrr-Fix-original-mtrr-range-get-for-mtrr_cleanup.patch
Patch25042: x86-range-make-add_range-use-blank-slot.patch
@@ -1470,18 +1457,12 @@ ApplyPatch criu-no-expert.patch
#rhbz 892811
ApplyPatch ath9k_rx_dma_stop_check.patch
-#rhbz 903192
-ApplyPatch 0001-kmsg-Honor-dmesg_restrict-sysctl-on-dev-kmsg.patch
-
#rhbz 927469
ApplyPatch fix-child-thread-introspection.patch
#rhbz 948262
ApplyPatch intel_iommu-Downgrade-the-warning-if-enabling-irq-remapping-fails.patch
-#rhbz 964335
-ApplyPatch Modify-UEFI-anti-bricking-code.patch
-
#CVE-2013-2140 rhbz 971146 971148
ApplyPatch xen-blkback-Check-device-permissions-before-allowing.patch
@@ -1491,19 +1472,12 @@ ApplyPatch cve-2013-2147-ciss-info-leak.patch
#CVE-2013-2148 rhbz 971258 971261
ApplyPatch fanotify-info-leak-in-copy_event_to_user.patch
-#CVE-2013-2852 rhbz 969518 971665
-ApplyPatch b43-stop-format-string-leaking-into-error-msgs.patch
-
#CVE-2013-2851 rhbz 969515 971662
ApplyPatch block-do-not-pass-disk-names-as-format-strings.patch
#CVE-2013-2164 rhbz 973100 973109
ApplyPatch cdrom-use-kzalloc-for-failing-hardware.patch
-#rhbz 954181
-ApplyPatch vhost_net-clear-msg.control-for-non-zerocopy-case-during-tx.patch
-ApplyPatch tuntap-set-SOCK_ZEROCOPY-flag-during-open.patch
-
#rhbz 973185
ApplyPatch x86-mtrr-Fix-original-mtrr-range-get-for-mtrr_cleanup.patch
ApplyPatch x86-range-make-add_range-use-blank-slot.patch
@@ -2310,6 +2284,9 @@ fi
# ||----w |
# || ||
%changelog
+* Mon Jun 17 2013 Josh Boyer <jwboyer@redhat.com> - 3.10.0-0.rc6.git0.1
+- Linux v3.10-rc6
+
* Fri Jun 14 2013 Kyle McMartin <kyle@redhat.com>
- ARM64 support (config-arm64)
Split out some config-armv7-generic options common between 32-bit and 64-bit