diff options
author | Josh Boyer <jwboyer@redhat.com> | 2013-06-17 08:28:32 -0400 |
---|---|---|
committer | Josh Boyer <jwboyer@redhat.com> | 2013-06-17 08:28:32 -0400 |
commit | 542e360438cf855ace303dd5d8112ee1e0651dd7 (patch) | |
tree | 4b8a2db50fca38e6c8a81b64b3b5163fd1b283e8 /kernel.spec | |
parent | 575de6c9a6d4f8210b41bbfa4e0f482da91d959b (diff) | |
download | kernel-542e360438cf855ace303dd5d8112ee1e0651dd7.tar.gz kernel-542e360438cf855ace303dd5d8112ee1e0651dd7.tar.xz kernel-542e360438cf855ace303dd5d8112ee1e0651dd7.zip |
Linux v3.10-rc6
Diffstat (limited to 'kernel.spec')
-rw-r--r-- | kernel.spec | 31 |
1 files changed, 4 insertions, 27 deletions
diff --git a/kernel.spec b/kernel.spec index 71fe323da..398637404 100644 --- a/kernel.spec +++ b/kernel.spec @@ -93,7 +93,7 @@ Summary: The Linux kernel # The next upstream release sublevel (base_sublevel+1) %define upstream_sublevel %(echo $((%{base_sublevel} + 1))) # The rc snapshot level -%define rcrev 5 +%define rcrev 6 # The git snapshot level %define gitrev 0 # Set rpm version accordingly @@ -744,9 +744,6 @@ Patch21242: criu-no-expert.patch #rhbz 892811 Patch21247: ath9k_rx_dma_stop_check.patch -#rhbz 903192 -Patch21261: 0001-kmsg-Honor-dmesg_restrict-sysctl-on-dev-kmsg.patch - Patch22000: weird-root-dentry-name-debug.patch #selinux ptrace child permissions @@ -758,9 +755,6 @@ Patch23006: fix-child-thread-introspection.patch #rhbz 948262 Patch25024: intel_iommu-Downgrade-the-warning-if-enabling-irq-remapping-fails.patch -#rhbz 964335 -Patch25026: Modify-UEFI-anti-bricking-code.patch - #CVE-2013-2140 rhbz 971146 971148 Patch25031: xen-blkback-Check-device-permissions-before-allowing.patch @@ -770,19 +764,12 @@ Patch25032: cve-2013-2147-ciss-info-leak.patch #CVE-2013-2148 rhbz 971258 971261 Patch25033: fanotify-info-leak-in-copy_event_to_user.patch -#CVE-2013-2852 rhbz 969518 971665 -Patch25034: b43-stop-format-string-leaking-into-error-msgs.patch - #CVE-2013-2851 rhbz 969515 971662 Patch25035: block-do-not-pass-disk-names-as-format-strings.patch #CVE-2013-2164 rhbz 973100 973109 Patch25038: cdrom-use-kzalloc-for-failing-hardware.patch -#rhbz 954181 -Patch25039: vhost_net-clear-msg.control-for-non-zerocopy-case-during-tx.patch -Patch25040: tuntap-set-SOCK_ZEROCOPY-flag-during-open.patch - #rhbz 973185 Patch25041: x86-mtrr-Fix-original-mtrr-range-get-for-mtrr_cleanup.patch Patch25042: x86-range-make-add_range-use-blank-slot.patch @@ -1470,18 +1457,12 @@ ApplyPatch criu-no-expert.patch #rhbz 892811 ApplyPatch ath9k_rx_dma_stop_check.patch -#rhbz 903192 -ApplyPatch 0001-kmsg-Honor-dmesg_restrict-sysctl-on-dev-kmsg.patch - #rhbz 927469 ApplyPatch fix-child-thread-introspection.patch #rhbz 948262 ApplyPatch intel_iommu-Downgrade-the-warning-if-enabling-irq-remapping-fails.patch -#rhbz 964335 -ApplyPatch Modify-UEFI-anti-bricking-code.patch - #CVE-2013-2140 rhbz 971146 971148 ApplyPatch xen-blkback-Check-device-permissions-before-allowing.patch @@ -1491,19 +1472,12 @@ ApplyPatch cve-2013-2147-ciss-info-leak.patch #CVE-2013-2148 rhbz 971258 971261 ApplyPatch fanotify-info-leak-in-copy_event_to_user.patch -#CVE-2013-2852 rhbz 969518 971665 -ApplyPatch b43-stop-format-string-leaking-into-error-msgs.patch - #CVE-2013-2851 rhbz 969515 971662 ApplyPatch block-do-not-pass-disk-names-as-format-strings.patch #CVE-2013-2164 rhbz 973100 973109 ApplyPatch cdrom-use-kzalloc-for-failing-hardware.patch -#rhbz 954181 -ApplyPatch vhost_net-clear-msg.control-for-non-zerocopy-case-during-tx.patch -ApplyPatch tuntap-set-SOCK_ZEROCOPY-flag-during-open.patch - #rhbz 973185 ApplyPatch x86-mtrr-Fix-original-mtrr-range-get-for-mtrr_cleanup.patch ApplyPatch x86-range-make-add_range-use-blank-slot.patch @@ -2310,6 +2284,9 @@ fi # ||----w | # || || %changelog +* Mon Jun 17 2013 Josh Boyer <jwboyer@redhat.com> - 3.10.0-0.rc6.git0.1 +- Linux v3.10-rc6 + * Fri Jun 14 2013 Kyle McMartin <kyle@redhat.com> - ARM64 support (config-arm64) Split out some config-armv7-generic options common between 32-bit and 64-bit |