lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 15 Sep 2015 17:53:36 +0300
From:	Nikolay Borisov <kernel@...p.com>
To:	Jiri Slaby <jslaby@...e.cz>, stable@...r.kernel.org
Cc:	linux@...ck-us.net, shuah.kh@...sung.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 3.12 00/33] 3.12.48-stable review

Hi Jiry,


Maybe you would want to consider this:
https://patchwork.ozlabs.org/patch/459088/

It has already found its ways in other stable kernels, despite not being
cc'ed to stable.

Regards,
Nikolay

On 09/15/2015 05:22 PM, Jiri Slaby wrote:
> This is the start of the stable review cycle for the 3.12.48 release.
> There are 33 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Thu Sep 17 16:20:25 CEST 2015.
> Anything received after that time might be too late.
> 
> The whole patch series can be found in one patch at:
> 	http://kernel.org/pub/linux/kernel/people/jirislaby/stable-review/patch-3.12.48-rc1.xz
> and the diffstat can be found below.
> 
> thanks,
> js
> 
> ===============
> 
> 
> Akinobu Mita (1):
>   bio: fix argument of __bio_add_page() for max_sectors > 0xffff
> 
> Andrey Vagin (1):
>   netfilter: nf_conntrack: fix RCU race in nf_conntrack_find_get
> 
> Angga (1):
>   ipv6: Make MLD packets to only be processed locally
> 
> Benjamin LaHaise (1):
>   aio: fix reqs_available handling
> 
> Dan Carpenter (1):
>   rds: fix an integer overflow test in rds_info_getsockopt()
> 
> Daniel Borkmann (1):
>   rtnetlink: verify IFLA_VF_INFO attributes before passing them to
>     driver
> 
> Dave Airlie (1):
>   drm/radeon: fix hotplug race at startup
> 
> David Milburn (1):
>   mtip32xx: dynamically allocate buffer in debugfs functions
> 
> Edward Hyunkoo Jee (1):
>   inet: frags: fix defragmented packet's IP header for af_packet
> 
> Eric Dumazet (2):
>   net: graceful exit from netif_alloc_netdev_queues()
>   ipv6: lock socket in ip6_datagram_connect()
> 
> Florian Westphal (1):
>   netlink: don't hold mutex in rcu callback when releasing mmapd ring
> 
> Heinz Mauelshagen (1):
>   dm cache mq: fix memory allocation failure for large cache devices
> 
> Herbert Xu (3):
>   net: Clone skb before setting peeked flag
>   net: Fix skb csum races when peeking
>   net: Fix skb_set_peeked use-after-free bug
> 
> Jack Morgenstein (1):
>   net/mlx4_core: Fix wrong index in propagating port change event to VFs
> 
> James Smart (1):
>   lpfc: Fix scsi prep dma buf error.
> 
> Julian Anastasov (2):
>   net: do not process device backlog during unregistration
>   net: call rcu_read_lock early in process_backlog
> 
> Mark Rustad (2):
>   PCI: Add dev_flags bit to access VPD through function 0
>   PCI: Add VPD function 0 quirk for Intel Ethernet devices
> 
> Mika Westerberg (1):
>   mfd: lpc_ich: Assign subdevice ids automatically
> 
> Nikolay Aleksandrov (3):
>   bridge: mdb: zero out the local br_ip variable before use
>   bridge: mdb: fix double add notification
>   bonding: fix destruction of bond with devices different from
>     arphrd_ether
> 
> Oleg Nesterov (1):
>   net: pktgen: fix race between pktgen_thread_worker() and
>     kthread_stop()
> 
> Pablo Neira Ayuso (1):
>   netfilter: nf_conntrack: don't release a conntrack with non-zero
>     refcnt
> 
> Shirish Pargaonkar (1):
>   cifs: Send a logoff request before removing a smb session
> 
> Stephen Smalley (1):
>   net/tipc: initialize security state for new connection socket
> 
> Tilman Schmidt (1):
>   isdn/gigaset: reset tty->receive_room when attaching ser_gigaset
> 
> Timo Teräs (1):
>   ip_tunnel: fix ipv4 pmtu check to honor inner ip header df
> 
> dingtianhong (1):
>   bonding: correct the MAC address for "follow" fail_over_mac policy
> 
>  drivers/block/mtip32xx/mtip32xx.c       |  47 +++++++++---
>  drivers/gpu/drm/radeon/radeon_irq_kms.c |   5 ++
>  drivers/isdn/gigaset/ser-gigaset.c      |  11 ++-
>  drivers/md/dm-cache-policy-mq.c         |   4 +-
>  drivers/mfd/lpc_ich.c                   |   8 +-
>  drivers/net/bonding/bond_main.c         |  20 +++++
>  drivers/net/ethernet/mellanox/mlx4/eq.c |   4 +-
>  drivers/pci/access.c                    |  61 ++++++++++++++-
>  drivers/pci/quirks.c                    |   9 +++
>  drivers/scsi/lpfc/lpfc_scsi.c           |   2 +-
>  fs/aio.c                                |  77 ++++++++++++++++++-
>  fs/bio.c                                |   2 +-
>  fs/cifs/connect.c                       |  25 +++++--
>  fs/cifs/smb2transport.c                 |  10 ++-
>  fs/cifs/transport.c                     |  11 ++-
>  include/linux/pci.h                     |   2 +
>  include/net/ip.h                        |   1 +
>  include/net/netfilter/nf_conntrack.h    |   2 +
>  net/bridge/br_mdb.c                     |   3 +-
>  net/core/datagram.c                     |  45 ++++++++++-
>  net/core/dev.c                          |  38 +++++-----
>  net/core/pktgen.c                       |   4 +-
>  net/core/rtnetlink.c                    | 128 ++++++++++++++++----------------
>  net/ipv4/datagram.c                     |  16 +++-
>  net/ipv4/ip_fragment.c                  |   7 +-
>  net/ipv4/ip_tunnel.c                    |   8 +-
>  net/ipv6/datagram.c                     |  20 +++--
>  net/ipv6/ip6_input.c                    |   6 +-
>  net/netfilter/nf_conntrack_core.c       |  55 +++++++++++---
>  net/netfilter/nf_synproxy_core.c        |   5 +-
>  net/netfilter/xt_CT.c                   |   7 +-
>  net/netlink/af_netlink.c                |  79 ++++++++++++--------
>  net/rds/info.c                          |   2 +-
>  net/tipc/socket.c                       |   1 +
>  34 files changed, 535 insertions(+), 190 deletions(-)
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ