lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130914141456.GA11969@kroah.com>
Date:	Sat, 14 Sep 2013 07:14:56 -0700
From:	Greg KH <gregkh@...uxfoundation.org>
To:	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:	lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.4.62

I'm announcing the release of the 3.4.62 kernel.

All users of the 3.4 kernel series must upgrade.

The updated 3.4.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.4.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                              |    2 -
 arch/m32r/boot/compressed/Makefile    |    6 +--
 arch/m32r/boot/compressed/misc.c      |   12 ++++++
 arch/x86/kvm/emulate.c                |    4 --
 drivers/net/bonding/bond_main.c       |    8 +++-
 drivers/net/ethernet/realtek/8139cp.c |    1 
 drivers/net/macvtap.c                 |   62 ++++++++++++++++++++--------------
 drivers/net/tun.c                     |    6 ++-
 drivers/vhost/vhost.c                 |    1 
 include/linux/icmpv6.h                |    2 +
 include/linux/ipv6.h                  |    1 
 net/bridge/br_multicast.c             |    3 +
 net/core/neighbour.c                  |   10 +++--
 net/core/sysctl_net_core.c            |    7 +++
 net/ipv4/fib_trie.c                   |    5 --
 net/ipv4/tcp_cubic.c                  |   12 +++---
 net/ipv6/addrconf.c                   |   10 ++---
 net/ipv6/icmp.c                       |   10 ++++-
 net/ipv6/ip6_fib.c                    |   16 ++++++--
 net/ipv6/ndisc.c                      |   16 ++++----
 net/ipv6/reassembly.c                 |    5 ++
 net/ipv6/tcp_ipv6.c                   |    2 -
 net/sched/sch_htb.c                   |    2 -
 net/tipc/eth_media.c                  |   15 +++++++-
 24 files changed, 145 insertions(+), 73 deletions(-)

Dan Carpenter (1):
      tun: signedness bug in tun_get_user()

Daniel Borkmann (2):
      net: bridge: convert MLDv2 Query MRC into msecs_to_jiffies for max_delay
      net: ipv6: tcp: fix potential use after free in tcp_v6_do_rcv

Dave Jones (1):
      8139cp: Fix skb leak in rx_status_loop failure path.

Eric Dumazet (3):
      fib_trie: remove potential out of bound access
      tcp: cubic: fix overflow error in bictcp_update()
      tcp: cubic: fix bug in bictcp_acked()

Geert Uytterhoeven (3):
      m32r: consistently use "suffix-$(...)"
      m32r: add memcpy() for CONFIG_KERNEL_GZIP=y
      m32r: make memset() global for CONFIG_KERNEL_BZIP2=y

Greg Kroah-Hartman (2):
      Revert "KVM: X86 emulator: fix source operand decoding for 8bit mov[zs]x instructions"
      Linux 3.4.62

Hannes Frederic Sowa (3):
      ipv6: don't stop backtracking in fib6_lookup_1 if subtree does not match
      ipv6: remove max_addresses check from ipv6_create_tempaddr
      ipv6: drop packets with multiple fragmentation headers

Jason Wang (2):
      vhost: zerocopy: poll vq in zerocopy callback
      macvtap: do not zerocopy if iov needs more pages than MAX_SKB_FRAGS

Jiri Bohac (1):
      ICMPv6: treat dest unreachable codes 5 and 6 as EACCES, not EPROTO

Roman Gushchin (1):
      net: check net.core.somaxconn sysctl values

Thomas Graf (1):
      ipv6: Don't depend on per socket memory for neighbour discovery messages

Veaceslav Falico (2):
      neighbour: populate neigh_parms on alloc before calling ndo_neigh_setup
      bonding: modify only neigh_parms owned by us

Ying Xue (1):
      tipc: fix lockdep warning during bearer initialization

stephen hemminger (1):
      htb: fix sign extension bug


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ