Bug 2019893
| Summary: | Update to 2.5.2 or newer | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Debarshi Ray <debarshir> |
| Component: | libseccomp | Assignee: | Zoltan Fridrich <zfridric> |
| Status: | CLOSED ERRATA | QA Contact: | Martin Zelený <mzeleny> |
| Severity: | medium | Docs Contact: | Jan Fiala <jafiala> |
| Priority: | medium | ||
| Version: | 8.6 | CC: | dapospis, jafiala, mzeleny, rsroka, tpopela, zfridric |
| Target Milestone: | rc | Keywords: | Rebase, Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | libseccomp-2.5.2-1.el8 | Doc Type: | Enhancement |
| Doc Text: |
.`libseccomp` rebased to 2.5.2
The `libseccomp` packages have been rebased to upstream version 2.5.2. This version provides bug fixes and enhancements, most notably:
* Updated the syscall table for Linux to version `v5.14-rc7`.
* Added the `get_notify_fd()` function to the Python bindings to get the notification file descriptor.
* Consolidated multiplexed syscall handling for all architectures into one location.
* Added multiplexed syscall support to the PowerPC (PPC) and MIPS architectures.
* Changed the meaning of the `SECCOMP_IOCTL_NOTIF_ID_VALID` operation within the kernel.
* Changed the `libseccomp` file descriptor notification logic to support the kernel's previous and new usage of `SECCOMP_IOCTL_NOTIF_ID_VALID`.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-05-10 15:21:10 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Debarshi Ray
2021-11-03 14:53:52 UTC
Thanks for working on this! Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (libseccomp bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2022:2029 |