Browse code

kernel: Update to version 4.19.26

- config changes due to new kernel version
- modified patches (not modified any functionality) to make compatibly
with new kernel version

Change-Id: I42c0f82c73decc6627ea3985ae90148ff78e176f
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/6821
Tested-by: michellew <michellew@vmware.com>
Reviewed-by: Srivatsa S. Bhat <srivatsab@vmware.com>

Ajay Kaher authored on 2019/03/05 12:38:54
Showing 11 changed files
... ...
@@ -1,6 +1,6 @@
1 1
 Summary:	Linux API header files
2 2
 Name:		linux-api-headers
3
-Version:	4.19.15
3
+Version:	4.19.26
4 4
 Release:	1%{?dist}
5 5
 License:	GPLv2
6 6
 URL:		http://www.kernel.org/
... ...
@@ -8,7 +8,7 @@ Group:		System Environment/Kernel
8 8
 Vendor:		VMware, Inc.
9 9
 Distribution: Photon
10 10
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
11
-%define sha1 linux=fb970b2014ecf9dcef23943f8095b28dfe0d6cca
11
+%define sha1 linux=18b659da3a2f7eaef7b16a3c468bed9f7071c17a
12 12
 BuildArch:	noarch
13 13
 %description
14 14
 The Linux API Headers expose the kernel's API for use by Glibc.
... ...
@@ -25,6 +25,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
25 25
 %defattr(-,root,root)
26 26
 %{_includedir}/*
27 27
 %changelog
28
+*   Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
29
+-   Update to version 4.19.26
28 30
 *   Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
29 31
 -   Update to version 4.19.15
30 32
 *   Mon Dec 10 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.6-1
... ...
@@ -28,21 +28,21 @@ values at runtime.
28 28
  3 files changed, 377 insertions(+), 4 deletions(-)
29 29
 
30 30
 
31
-diff -ur linux-4.19.1/drivers/pci/pci.c linux-4.19.1_new/drivers/pci/pci.c
32
-+++ linux-4.19.1_new/drivers/pci/pci.c	2018-11-08 01:59:21.813106907 +0000
33
-@@ -6116,6 +6116,8 @@
34
- 				pci_add_flags(PCI_SCAN_ALL_PCIE_DEVS);
31
+diff -ur linux-4.19.26/drivers/pci/pci.c linux-4.19.26_new/drivers/pci/pci.c
32
+--- linux-4.19.26/drivers/pci/pci.c	2019-02-27 14:39:03.000000000 +0530
33
+@@ -6115,6 +6115,8 @@
35 34
  			} else if (!strncmp(str, "disable_acs_redir=", 18)) {
36
- 				disable_acs_redir_param = str + 18;
35
+ 				disable_acs_redir_param =
36
+ 					kstrdup(str + 18, GFP_KERNEL);
37 37
 +			} else if (!strncmp(str, "scan_all", 8)) {
38 38
 +				pci_scan_all();
39 39
  			} else {
40 40
  				printk(KERN_ERR "PCI: Unknown option `%s'\n",
41 41
  						str);
42
-diff -ur linux-4.19.1/drivers/pci/pci.h linux-4.19.1_new/drivers/pci/pci.h
43
-+++ linux-4.19.1_new/drivers/pci/pci.h	2018-11-08 01:57:51.917110565 +0000
42
+diff -ur linux-4.19.26/drivers/pci/pci.h linux-4.19.26_new/drivers/pci/pci.h
43
+--- linux-4.19.26/drivers/pci/pci.h	2019-02-27 14:39:03.000000000 +0530
44 44
 @@ -147,6 +147,8 @@
45 45
  static inline void pci_no_msi(void) { }
46 46
  #endif
... ...
@@ -52,9 +52,9 @@ diff -ur linux-4.19.1/drivers/pci/pci.h linux-4.19.1_new/drivers/pci/pci.h
52 52
  static inline void pci_msi_set_enable(struct pci_dev *dev, int enable)
53 53
  {
54 54
  	u16 control;
55
-diff -ur linux-4.19.1/drivers/pci/probe.c linux-4.19.1_new/drivers/pci/probe.c
56
-+++ linux-4.19.1_new/drivers/pci/probe.c	2018-11-08 01:57:51.917110565 +0000
55
+diff -ur linux-4.19.26/drivers/pci/probe.c linux-4.19.26_new/drivers/pci/probe.c
56
+--- linux-4.19.26/drivers/pci/probe.c	2019-02-27 14:39:03.000000000 +0530
57 57
 @@ -168,6 +168,346 @@
58 58
  
59 59
  #define PCI_COMMAND_DECODE_ENABLE	(PCI_COMMAND_MEMORY | PCI_COMMAND_IO)
... ...
@@ -1,6 +1,6 @@
1 1
 #
2 2
 # Automatically generated file; DO NOT EDIT.
3
-# Linux/x86 4.19.15 Kernel Configuration
3
+# Linux/x86 4.19.26 Kernel Configuration
4 4
 #
5 5
 
6 6
 #
... ...
@@ -3430,6 +3430,7 @@ CONFIG_DRM_KMS_HELPER=y
3430 3430
 CONFIG_DRM_KMS_FB_HELPER=y
3431 3431
 CONFIG_DRM_FBDEV_EMULATION=y
3432 3432
 CONFIG_DRM_FBDEV_OVERALLOC=100
3433
+# CONFIG_DRM_FBDEV_LEAK_PHYS_SMEM is not set
3433 3434
 # CONFIG_DRM_LOAD_EDID_FIRMWARE is not set
3434 3435
 # CONFIG_DRM_DP_CEC is not set
3435 3436
 CONFIG_DRM_TTM=y
... ...
@@ -5255,7 +5256,6 @@ CONFIG_CIFS_STATS2=y
5255 5255
 # CONFIG_CIFS_ALLOW_INSECURE_LEGACY is not set
5256 5256
 CONFIG_CIFS_UPCALL=y
5257 5257
 CONFIG_CIFS_XATTR=y
5258
-CONFIG_CIFS_POSIX=y
5259 5258
 CONFIG_CIFS_ACL=y
5260 5259
 CONFIG_CIFS_DEBUG=y
5261 5260
 # CONFIG_CIFS_DEBUG2 is not set
... ...
@@ -1,6 +1,6 @@
1 1
 #
2 2
 # Automatically generated file; DO NOT EDIT.
3
-# Linux/x86 4.19.6 Kernel Configuration
3
+# Linux/x86 4.19.26 Kernel Configuration
4 4
 #
5 5
 
6 6
 #
... ...
@@ -93,6 +93,7 @@ CONFIG_PREEMPT_NONE=y
93 93
 CONFIG_TICK_CPU_ACCOUNTING=y
94 94
 # CONFIG_VIRT_CPU_ACCOUNTING_GEN is not set
95 95
 # CONFIG_IRQ_TIME_ACCOUNTING is not set
96
+CONFIG_HAVE_SCHED_AVG_IRQ=y
96 97
 CONFIG_BSD_PROCESS_ACCT=y
97 98
 CONFIG_BSD_PROCESS_ACCT_V3=y
98 99
 CONFIG_TASKSTATS=y
... ...
@@ -2883,6 +2884,7 @@ CONFIG_DRM_KMS_HELPER=y
2883 2883
 CONFIG_DRM_KMS_FB_HELPER=y
2884 2884
 CONFIG_DRM_FBDEV_EMULATION=y
2885 2885
 CONFIG_DRM_FBDEV_OVERALLOC=100
2886
+# CONFIG_DRM_FBDEV_LEAK_PHYS_SMEM is not set
2886 2887
 # CONFIG_DRM_LOAD_EDID_FIRMWARE is not set
2887 2888
 # CONFIG_DRM_DP_CEC is not set
2888 2889
 CONFIG_DRM_TTM=y
... ...
@@ -3966,7 +3968,6 @@ CONFIG_CIFS_STATS2=y
3966 3966
 # CONFIG_CIFS_ALLOW_INSECURE_LEGACY is not set
3967 3967
 CONFIG_CIFS_UPCALL=y
3968 3968
 CONFIG_CIFS_XATTR=y
3969
-CONFIG_CIFS_POSIX=y
3970 3969
 CONFIG_CIFS_ACL=y
3971 3970
 CONFIG_CIFS_DEBUG=y
3972 3971
 # CONFIG_CIFS_DEBUG2 is not set
... ...
@@ -1,6 +1,6 @@
1 1
 #
2 2
 # Automatically generated file; DO NOT EDIT.
3
-# Linux/x86 4.19.15 Kernel Configuration
3
+# Linux/x86 4.19.26 Kernel Configuration
4 4
 #
5 5
 
6 6
 #
... ...
@@ -3088,6 +3088,7 @@ CONFIG_DRM_KMS_HELPER=y
3088 3088
 CONFIG_DRM_KMS_FB_HELPER=y
3089 3089
 CONFIG_DRM_FBDEV_EMULATION=y
3090 3090
 CONFIG_DRM_FBDEV_OVERALLOC=100
3091
+# CONFIG_DRM_FBDEV_LEAK_PHYS_SMEM is not set
3091 3092
 # CONFIG_DRM_LOAD_EDID_FIRMWARE is not set
3092 3093
 # CONFIG_DRM_DP_CEC is not set
3093 3094
 CONFIG_DRM_TTM=y
... ...
@@ -4330,7 +4331,6 @@ CONFIG_CIFS_STATS2=y
4330 4330
 # CONFIG_CIFS_ALLOW_INSECURE_LEGACY is not set
4331 4331
 CONFIG_CIFS_UPCALL=y
4332 4332
 CONFIG_CIFS_XATTR=y
4333
-CONFIG_CIFS_POSIX=y
4334 4333
 CONFIG_CIFS_ACL=y
4335 4334
 CONFIG_CIFS_DEBUG=y
4336 4335
 # CONFIG_CIFS_DEBUG2 is not set
4337 4336
deleted file mode 100644
... ...
@@ -1,115 +0,0 @@
1
-KASAN has found use-after-free in sockfs_setattr.
2
-The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close()
3
-and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore
4
-that crypto module forgets to set the sk to NULL after af_alg_release.
5
-
6
-KASAN report details as below:
7
-BUG: KASAN: use-after-free in sockfs_setattr+0x120/0x150
8
-Write of size 4 at addr ffff88837b956128 by task syz-executor0/4186
9
-
10
-CPU: 2 PID: 4186 Comm: syz-executor0 Not tainted xxx + #1
11
-Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
12
-1.10.2-1ubuntu1 04/01/2014
13
-Call Trace:
14
- dump_stack+0xca/0x13e
15
- print_address_description+0x79/0x330
16
- ? vprintk_func+0x5e/0xf0
17
- kasan_report+0x18a/0x2e0
18
- ? sockfs_setattr+0x120/0x150
19
- sockfs_setattr+0x120/0x150
20
- ? sock_register+0x2d0/0x2d0
21
- notify_change+0x90c/0xd40
22
- ? chown_common+0x2ef/0x510
23
- chown_common+0x2ef/0x510
24
- ? chmod_common+0x3b0/0x3b0
25
- ? __lock_is_held+0xbc/0x160
26
- ? __sb_start_write+0x13d/0x2b0
27
- ? __mnt_want_write+0x19a/0x250
28
- do_fchownat+0x15c/0x190
29
- ? __ia32_sys_chmod+0x80/0x80
30
- ? trace_hardirqs_on_thunk+0x1a/0x1c
31
- __x64_sys_fchownat+0xbf/0x160
32
- ? lockdep_hardirqs_on+0x39a/0x5e0
33
- do_syscall_64+0xc8/0x580
34
- entry_SYSCALL_64_after_hwframe+0x49/0xbe
35
-RIP: 0033:0x462589
36
-Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48 89
37
-f7 48 89 d6 48 89
38
-ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3
39
-48 c7 c1 bc ff ff
40
-ff f7 d8 64 89 01 48
41
-RSP: 002b:00007fb4b2c83c58 EFLAGS: 00000246 ORIG_RAX: 0000000000000104
42
-RAX: ffffffffffffffda RBX: 000000000072bfa0 RCX: 0000000000462589
43
-RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000007
44
-RBP: 0000000000000005 R08: 0000000000001000 R09: 0000000000000000
45
-R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4b2c846bc
46
-R13: 00000000004bc733 R14: 00000000006f5138 R15: 00000000ffffffff
47
-
48
-Allocated by task 4185:
49
- kasan_kmalloc+0xa0/0xd0
50
- __kmalloc+0x14a/0x350
51
- sk_prot_alloc+0xf6/0x290
52
- sk_alloc+0x3d/0xc00
53
- af_alg_accept+0x9e/0x670
54
- hash_accept+0x4a3/0x650
55
- __sys_accept4+0x306/0x5c0
56
- __x64_sys_accept4+0x98/0x100
57
- do_syscall_64+0xc8/0x580
58
- entry_SYSCALL_64_after_hwframe+0x49/0xbe
59
-
60
-Freed by task 4184:
61
- __kasan_slab_free+0x12e/0x180
62
- kfree+0xeb/0x2f0
63
- __sk_destruct+0x4e6/0x6a0
64
- sk_destruct+0x48/0x70
65
- __sk_free+0xa9/0x270
66
- sk_free+0x2a/0x30
67
- af_alg_release+0x5c/0x70
68
- __sock_release+0xd3/0x280
69
- sock_close+0x1a/0x20
70
- __fput+0x27f/0x7f0
71
- task_work_run+0x136/0x1b0
72
- exit_to_usermode_loop+0x1a7/0x1d0
73
- do_syscall_64+0x461/0x580
74
- entry_SYSCALL_64_after_hwframe+0x49/0xbe
75
-
76
-Syzkaller reproducer:
77
-r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0,
78
-0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,
79
-0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,
80
-0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0,
81
-0xffffffffffffffff, 0x0)
82
-r1 = socket$alg(0x26, 0x5, 0x0)
83
-getrusage(0x0, 0x0)
84
-bind(r1, &(0x7f00000001c0)=@alg={0x26, 'hash\x00', 0x0, 0x0,
85
-'sha256-ssse3\x00'}, 0x80)
86
-r2 = accept(r1, 0x0, 0x0)
87
-r3 = accept4$unix(r2, 0x0, 0x0, 0x0)
88
-r4 = dup3(r3, r0, 0x0)
89
-fchownat(r4, &(0x7f00000000c0)='\x00', 0x0, 0x0, 0x1000)
90
-
91
-Fixes: 6d8c50dcb029 ("socket: close race condition between sock_close() and sockfs_setattr()")
92
-Signed-off-by: Mao Wenan <maowenan@huawei.com>
93
- crypto/af_alg.c | 4 +++-
94
- 1 file changed, 3 insertions(+), 1 deletion(-)
95
-
96
-diff --git a/crypto/af_alg.c b/crypto/af_alg.c
97
-index 17eb09d..ec78a04 100644
98
-+++ b/crypto/af_alg.c
99
-@@ -122,8 +122,10 @@ static void alg_do_release(const struct af_alg_type *type, void *private)
100
- 
101
- int af_alg_release(struct socket *sock)
102
- {
103
--	if (sock->sk)
104
-+	if (sock->sk) {
105
- 		sock_put(sock->sk);
106
-+		sock->sk = NULL;
107
-+	}
108
- 	return 0;
109
- }
110
- EXPORT_SYMBOL_GPL(af_alg_release);
111
-2.7.4
112
-
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-aws
4
-Version:        4.19.15
5
-Release:        2%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.19.26
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=fb970b2014ecf9dcef23943f8095b28dfe0d6cca
12
+%define sha1 linux=18b659da3a2f7eaef7b16a3c468bed9f7071c17a
13 13
 Source1:	config-aws
14 14
 Source2:	initramfs.trigger
15 15
 # common
... ...
@@ -35,8 +35,6 @@ Patch29:        4.17-0001-apparmor-patch-to-provide-compatibility-with-v2.x-ne.p
35 35
 Patch30:        4.17-0002-apparmor-af_unix-mediation.patch
36 36
 Patch31:        4.17-0003-apparmor-fix-use-after-free-in-sk_peer_label.patch
37 37
 Patch32:        4.18-0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
38
-#Fix CVE-2019-8912
39
-Patch33:        fix_use_after_free_in_sockfs_setattr.patch
40 38
 
41 39
 # Amazon AWS
42 40
 Patch101: 0002-watchdog-Disable-watchdog-on-virtual-machines.patch
... ...
@@ -154,7 +152,6 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
154 154
 %patch30 -p1
155 155
 %patch31 -p1
156 156
 %patch32 -p1
157
-%patch33 -p1
158 157
 
159 158
 %patch101 -p1
160 159
 %patch102 -p1
... ...
@@ -359,6 +356,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
359 359
 %{_libdir}/perf/include/bpf/*
360 360
 
361 361
 %changelog
362
+*   Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
363
+-   Update to version 4.19.26
362 364
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.19.15-2
363 365
 -   Fix CVE-2019-8912
364 366
 *   Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-esx
4
-Version:        4.19.15
5
-Release:        2%{?dist}
4
+Version:        4.19.26
5
+Release:        1%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=fb970b2014ecf9dcef23943f8095b28dfe0d6cca
12
+%define sha1 linux=18b659da3a2f7eaef7b16a3c468bed9f7071c17a
13 13
 Source1:        config-esx
14 14
 Source2:        initramfs.trigger
15 15
 # common
... ...
@@ -39,8 +39,6 @@ Patch25:        4.18-0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.p
39 39
 Patch26:        4.17-0001-apparmor-patch-to-provide-compatibility-with-v2.x-ne.patch
40 40
 Patch27:        4.17-0002-apparmor-af_unix-mediation.patch
41 41
 Patch28:        4.17-0003-apparmor-fix-use-after-free-in-sk_peer_label.patch
42
-#Fix CVE-2019-8912
43
-Patch29:        fix_use_after_free_in_sockfs_setattr.patch
44 42
 
45 43
 BuildArch:     x86_64
46 44
 BuildRequires: bc
... ...
@@ -99,7 +97,6 @@ The Linux package contains the Linux kernel doc files
99 99
 %patch26 -p1
100 100
 %patch27 -p1
101 101
 %patch28 -p1
102
-%patch29 -p1
103 102
 
104 103
 %build
105 104
 # patch vmw_balloon driver
... ...
@@ -196,6 +193,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
196 196
 /usr/src/linux-headers-%{uname_r}
197 197
 
198 198
 %changelog
199
+*   Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
200
+-   Update to version 4.19.26
199 201
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.19.15-2
200 202
 -   Fix CVE-2019-8912
201 203
 *   Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-secure
4
-Version:        4.19.15
5
-Release:        2%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.19.26
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=fb970b2014ecf9dcef23943f8095b28dfe0d6cca
12
+%define sha1 linux=18b659da3a2f7eaef7b16a3c468bed9f7071c17a
13 13
 Source1:        config-secure
14 14
 Source2:        initramfs.trigger
15 15
 # common
... ...
@@ -38,9 +38,6 @@ Patch32:        4.17-0001-apparmor-patch-to-provide-compatibility-with-v2.x-ne.p
38 38
 Patch33:        4.17-0002-apparmor-af_unix-mediation.patch
39 39
 Patch34:        4.17-0003-apparmor-fix-use-after-free-in-sk_peer_label.patch
40 40
 Patch35:        4.18-0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
41
-#Fix CVE-2019-8912
42
-Patch36:        fix_use_after_free_in_sockfs_setattr.patch
43
-
44 41
 
45 42
 # NSX requirements (should be removed)
46 43
 Patch99:        LKCM.patch
... ...
@@ -111,7 +108,6 @@ The Linux package contains the Linux kernel doc files
111 111
 %patch33 -p1
112 112
 %patch34 -p1
113 113
 %patch35 -p1
114
-%patch36 -p1
115 114
 
116 115
 pushd ..
117 116
 %patch99 -p0
... ...
@@ -239,6 +235,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
239 239
 /usr/src/linux-headers-%{uname_r}
240 240
 
241 241
 %changelog
242
+*   Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
243
+-   Update to version 4.19.26
242 244
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.19.15-2
243 245
 -   Fix CVE-2019-8912
244 246
 *   Tue Jan 15 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.19.15-1
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux
4
-Version:        4.19.15
5
-Release:        3%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.19.26
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=fb970b2014ecf9dcef23943f8095b28dfe0d6cca
12
+%define sha1 linux=18b659da3a2f7eaef7b16a3c468bed9f7071c17a
13 13
 Source1:	config
14 14
 Source2:	initramfs.trigger
15 15
 %define ena_version 1.6.0
... ...
@@ -43,8 +43,6 @@ Patch29:        4.17-0001-apparmor-patch-to-provide-compatibility-with-v2.x-ne.p
43 43
 Patch30:        4.17-0002-apparmor-af_unix-mediation.patch
44 44
 Patch31:        4.17-0003-apparmor-fix-use-after-free-in-sk_peer_label.patch
45 45
 Patch32:        4.18-0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
46
-#Fix CVE-2019-8912
47
-Patch33:	fix_use_after_free_in_sockfs_setattr.patch
48 46
 
49 47
 %ifarch aarch64
50 48
 # NXP LS1012a FRWY patches
... ...
@@ -182,7 +180,6 @@ Kernel Device Tree Blob files for NXP ls1012a FRWY board
182 182
 %patch30 -p1
183 183
 %patch31 -p1
184 184
 %patch32 -p1
185
-%patch33 -p1
186 185
 
187 186
 %ifarch aarch64
188 187
 # NXP FSL_PPFE Driver patches
... ...
@@ -441,6 +438,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
441 441
 %endif
442 442
 
443 443
 %changelog
444
+*   Tue Mar 05 2019 Ajay Kaher <akaher@vmware.com> 4.19.26-1
445
+-   Update to version 4.19.26
444 446
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.19.15-3
445 447
 -   Fix CVE-2019-8912
446 448
 *   Thu Jan 24 2019 Alexey Makhalov <amakhalov@vmware.com> 4.19.15-2
... ...
@@ -1,9 +1,9 @@
1 1
 diff --git a/drivers/usb/class/cdc-acm.c b/drivers/usb/class/cdc-acm.c
2
-index 3b9aadd007f5..96a55ea46c25 100644
2
+index 08b8aa5..62a662d 100644
3 3
 --- a/drivers/usb/class/cdc-acm.c
4 4
 +++ b/drivers/usb/class/cdc-acm.c
5
-@@ -1942,6 +1942,20 @@ static const struct usb_device_id acm_ids[] = {
6
- 	.driver_info = IGNORE_DEVICE,
5
+@@ -1887,6 +1887,20 @@ static const struct usb_device_id acm_ids[] = {
6
+ 	.driver_info = SEND_ZERO_PACKET,
7 7
  	},
8 8
  
9 9
 +	/* Exclude Exar USB serial ports */