lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 29 Sep 2018 04:19:08 -0700
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.9.130

I'm announcing the release of the 4.9.130 kernel.

All users of the 4.9 kernel series must upgrade.

The updated 4.9.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                    |    2 -
 arch/x86/xen/pmu.c                          |    2 -
 drivers/gpu/drm/nouveau/nouveau_connector.c |   20 ++++++-----
 drivers/gpu/drm/nouveau/nouveau_display.c   |   33 ++++++++++++++----
 drivers/gpu/drm/vc4/vc4_plane.c             |   25 ++++++--------
 drivers/hid/hid-core.c                      |    3 +
 drivers/hid/hid-ids.h                       |    2 +
 drivers/hid/hid-sony.c                      |    6 +++
 drivers/infiniband/hw/cxgb4/qp.c            |    6 +++
 drivers/misc/vmw_balloon.c                  |    1 
 drivers/net/appletalk/ipddp.c               |    8 +++-
 drivers/net/ethernet/hp/hp100.c             |    2 -
 drivers/net/xen-netfront.c                  |    8 ++++
 drivers/pci/host/pci-aardvark.c             |    1 
 drivers/pci/quirks.c                        |    6 ---
 drivers/platform/x86/alienware-wmi.c        |    1 
 drivers/target/iscsi/iscsi_target_auth.c    |   30 ++++++++---------
 drivers/tty/vt/vt_ioctl.c                   |    4 ++
 fs/ext4/dir.c                               |   20 +++++------
 fs/ext4/inline.c                            |    4 +-
 fs/ext4/mmp.c                               |    1 
 fs/ext4/namei.c                             |    6 +++
 fs/ext4/resize.c                            |   23 ++++++++++++-
 fs/ext4/super.c                             |    4 ++
 fs/ocfs2/buffer_head_io.c                   |    1 
 include/net/nfc/hci.h                       |    2 -
 kernel/sched/fair.c                         |    3 +
 kernel/trace/ring_buffer.c                  |    2 +
 mm/shmem.c                                  |    2 +
 net/core/neighbour.c                        |   13 ++++---
 net/ipv4/af_inet.c                          |    1 
 net/ipv4/udp.c                              |   49 ++++++++++++++--------------
 net/ipv6/ip6_offload.c                      |    1 
 net/ipv6/ip6_output.c                       |    6 +--
 net/nfc/hci/core.c                          |   10 +++++
 sound/firewire/bebob/bebob.c                |    2 +
 sound/firewire/bebob/bebob_maudio.c         |   28 ++++++++--------
 sound/firewire/digi00x/digi00x.c            |    1 
 sound/firewire/fireworks/fireworks.c        |    2 +
 sound/firewire/oxfw/oxfw.c                  |   10 +++++
 sound/firewire/tascam/tascam.c              |    1 
 sound/pci/emu10k1/emufx.c                   |    2 -
 sound/soc/codecs/cs4265.c                   |    4 +-
 43 files changed, 235 insertions(+), 123 deletions(-)

Boris Brezillon (1):
      drm/vc4: Fix the "no scaling" case on multi-planar YUV formats

Boris Ostrovsky (1):
      xen/x86/vpmu: Zero struct pt_regs before calling into sample handling code

Colin Ian King (1):
      net: hp100: fix always-true check for link up state

Eric Biggers (1):
      ext4: show test_dummy_encryption mount option in /proc/mounts

Eric Dumazet (1):
      ipv6: fix possible use-after-free in ip6_xmit()

Greg Kroah-Hartman (1):
      Linux 4.9.130

Gustavo A. R. Silva (1):
      tty: vt_ioctl: fix potential Spectre v1

Joel Fernandes (Google) (1):
      mm: shmem.c: Correctly annotate new inodes for lockdep

Juergen Gross (1):
      xen/netfront: don't bug in case of too many frags

Junxiao Bi (1):
      ocfs2: fix ocfs2 read block panic

Li Dongyang (1):
      ext4: don't mark mmp buffer head dirty

Lyude Paul (3):
      drm/nouveau/drm/nouveau: Fix bogus drm_kms_helper_poll_enable() placement
      drm/nouveau/drm/nouveau: Use pm_runtime_get_noresume() in connector_detect()
      drm/nouveau/drm/nouveau: Prevent handling ACPI HPD events too early

Mario Limonciello (1):
      platform/x86: alienware-wmi: Correct a memory leak

Mika Westerberg (1):
      Revert "PCI: Add ACS quirk for Intel 300 series"

Nadav Amit (1):
      vmw_balloon: include asm/io.h

Paolo Abeni (1):
      udp4: fix IP_CMSG_CHECKSUM for connected sockets

Roderick Colenbrander (2):
      HID: sony: Update device ids
      HID: sony: Support DS4 dongle

Steve Muckle (1):
      sched/fair: Fix vruntime_normalized() for remote non-migration wakeup

Steve Wise (1):
      iw_cxgb4: only allow 1 flush on user qps

Suren Baghdasaryan (2):
      NFC: Fix possible memory corruption when handling SHDLC I-Frame commands
      NFC: Fix the number of pipes

Sébastien Szymanski (1):
      ASoC: cs4265: fix MMTLR Data switch control

Takashi Sakamoto (8):
      ALSA: bebob: fix memory leak for M-Audio FW1814 and ProjectMix I/O at error path
      ALSA: bebob: use address returned by kmalloc() instead of kernel stack for streaming DMA mapping
      ALSA: firewire-digi00x: fix memory leak of private data
      ALSA: firewire-tascam: fix memory leak of private data
      ALSA: fireworks: fix memory leak of response buffer at error path
      ALSA: oxfw: fix memory leak for model-dependent data at error path
      ALSA: oxfw: fix memory leak of discovered stream formats at error path
      ALSA: oxfw: fix memory leak of private data

Theodore Ts'o (5):
      ext4: check to make sure the rename(2)'s destination is not freed
      ext4: avoid divide by zero fault when deleting corrupted inline directories
      ext4: recalucate superblock checksum after updating free blocks/inodes
      ext4: fix online resize's handling of a too-small final block group
      ext4: fix online resizing for bigalloc file systems with a 1k block size

Toke Høiland-Jørgensen (1):
      gso_segment: Reset skb->mac_len after modifying network header

Vaibhav Nagarnaik (1):
      ring-buffer: Allow for rescheduling when removing pages

Vasily Khoruzhick (1):
      neighbour: confirm neigh entries when ARP packet is received

Vincent Pelletier (1):
      scsi: target: iscsi: Use hex2bin instead of a re-implementation

Willy Tarreau (2):
      ALSA: emu10k1: fix possible info leak to userspace on SNDRV_EMU10K1_IOCTL_INFO
      net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT

Zachary Zhang (1):
      PCI: aardvark: Size bridges before resources allocation


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ