lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 1 May 2013 10:06:14 -0700
From:	Greg KH <gregkh@...uxfoundation.org>
To:	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:	lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.4.43

I'm announcing the release of the 3.4.43 kernel.

All users of the 3.4 kernel series must upgrade.

The updated 3.4.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.4.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                        |    2 
 arch/sparc/include/asm/pgtable_64.h             |    1 
 arch/sparc/include/asm/switch_to_64.h           |    3 
 arch/sparc/include/asm/tlbflush_64.h            |   37 ++++++-
 arch/sparc/kernel/smp_64.c                      |   41 +++++++-
 arch/sparc/mm/tlb.c                             |   39 +++++++
 arch/sparc/mm/tsb.c                             |   57 ++++++++---
 arch/sparc/mm/ultra.S                           |  119 +++++++++++++++++++-----
 drivers/net/bonding/bond_main.c                 |   10 ++
 drivers/net/ethernet/atheros/atl1e/atl1e.h      |    2 
 drivers/net/ethernet/atheros/atl1e/atl1e_main.c |    1 
 drivers/tty/tty_io.c                            |   14 ++
 fs/aio.c                                        |    2 
 include/linux/netdevice.h                       |    2 
 include/linux/skbuff.h                          |    7 +
 include/linux/socket.h                          |    3 
 include/net/scm.h                               |    2 
 net/atm/common.c                                |    2 
 net/ax25/af_ax25.c                              |    1 
 net/bluetooth/af_bluetooth.c                    |    4 
 net/bluetooth/rfcomm/sock.c                     |    1 
 net/caif/caif_socket.c                          |    2 
 net/core/dev.c                                  |    4 
 net/core/dev_addr_lists.c                       |    6 -
 net/core/rtnetlink.c                            |    4 
 net/core/sock.c                                 |   14 ++
 net/ipv4/esp4.c                                 |    6 -
 net/ipv4/ip_fragment.c                          |   15 ++-
 net/ipv4/syncookies.c                           |    4 
 net/ipv4/tcp_input.c                            |   65 ++++++-------
 net/ipv4/tcp_output.c                           |    8 +
 net/ipv6/addrconf.c                             |   27 +++++
 net/ipv6/reassembly.c                           |   13 ++
 net/irda/af_irda.c                              |    2 
 net/iucv/af_iucv.c                              |    2 
 net/llc/af_llc.c                                |    2 
 net/netrom/af_netrom.c                          |    1 
 net/nfc/llcp/sock.c                             |    2 
 net/rose/af_rose.c                              |    1 
 net/sched/sch_cbq.c                             |    5 -
 net/sctp/auth.c                                 |    2 
 net/tipc/socket.c                               |    7 +
 net/unix/af_unix.c                              |    2 
 43 files changed, 421 insertions(+), 123 deletions(-)

Balakumaran Kannan (1):
      net IPv6 : Fix broken IPv6 routing table after loopback down-up

Ben Greear (1):
      net: rate-limit warn-bad-offload splats.

Daniel Borkmann (1):
      net: sctp: sctp_auth_key_put: use kzfree instead of kfree

David S. Miller (1):
      sparc64: Fix race in TLB batch processing.

Dmitry Popov (1):
      tcp: incoming connections might use wrong route under synflood

Eric Dumazet (2):
      tcp: call tcp_replace_ts_recent() from tcp_ack()
      net: drop dst before queueing fragments

Eric W. Biederman (1):
      af_unix: If we don't care about credentials coallesce all messages

Greg Kroah-Hartman (1):
      Linux 3.4.43

Hannes Frederic Sowa (1):
      atl1e: limit gso segment size to prevent generation of wrong ip length fields

Jiri Slaby (2):
      TTY: do not update atime/mtime on read/write
      TTY: fix atime/mtime regression

Linus Torvalds (1):
      net: fix incorrect credentials passing

Mathias Krause (12):
      atm: update msg_namelen in vcc_recvmsg()
      ax25: fix info leak via msg_name in ax25_recvmsg()
      Bluetooth: fix possible info leak in bt_sock_recvmsg()
      Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg()
      caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
      irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
      iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
      llc: Fix missing msg_namelen update in llc_ui_recvmsg()
      netrom: fix info leak via msg_name in nr_recvmsg()
      NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
      rose: fix info leak via msg_name in rose_recvmsg()
      tipc: fix info leaks via msg_name in recv_msg/recv_stream

Michael Riesch (1):
      rtnetlink: Call nlmsg_parse() with correct header length

Patrick McHardy (1):
      netfilter: don't reset nf_trace in nf_reset()

Thomas Graf (1):
      tcp: Reallocate headroom if it would overflow csum_start

Vasily Averin (1):
      cbq: incorrect processing of high limits

Vlad Yasevich (1):
      net: count hw_addr syncs so that unsync works properly.

Wei Yongjun (2):
      netrom: fix invalid use of sizeof in nr_recvmsg()
      esp4: fix error return code in esp_output()

Zhao Hongjiang (1):
      aio: fix possible invalid memory access when DEBUG is enabled

nikolay@...hat.com (2):
      bonding: fix bonding_masters race condition in bond unloading
      bonding: IFF_BONDING is not stripped on enslave failure


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ