lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 30 Nov 2015 17:04:46 +0100 From: Willy Tarreau <w@....eu> To: linux-kernel@...r.kernel.org, stable@...r.kernel.org Cc: Ben Hutchings <ben@...adent.org.uk> Subject: Re: [PATCH 2.6.32 00/38] 2.6.32.69-longterm review Here comes 2.6.32.69-rc2. It adds or replaces the following patches on top of -rc1 that were needed or incorrectly backported as spotted by Ben : Chris Wright (1): security: add cred argument to security_capable() Eric W. Biederman (1): vfs: Test for and handle paths that are unreachable from their mnt_root Konstantin Khlebnikov (1): pagemap: hide physical addresses from non-privileged users These patches will be posted as a response to this one (with 39 and 40 being the extra ones). If anyone has any issue with these being applied, please let me know. If anyone is a maintainer of the proper subsystem, and wants to add a Signed-off-by: line to the patch, please respond with it. If anyone thinks some important patches are missing and should be added prior to the release, please report them quickly with their respective mainline commit IDs. Last response delay remains unchanged : Sat Dec 5 22:47:02 CET 2015. The updated patch series can be found in one patch at : https://kernel.org/pub/linux/kernel/v2.6/longterm-review/patch-2.6.32.69-rc2.gz Thanks, Willy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists