lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 16 Aug 2016 22:06:43 +0200
From:	Greg KH <gregkh@...uxfoundation.org>
To:	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>,
	torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:	lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.14.76

I'm announcing the release of the 3.14.76 kernel.

All users of the 3.14 kernel series must upgrade.

The updated 3.14.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.14.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                     |    2 
 arch/arm/kernel/sys_oabi-compat.c            |    8 +
 arch/mips/kernel/scall64-n32.S               |    2 
 arch/mips/kernel/scall64-o32.S               |    2 
 arch/x86/include/asm/mmu_context.h           |   33 +++++++
 arch/x86/mm/tlb.c                            |   25 +++++
 block/genhd.c                                |    1 
 crypto/gcm.c                                 |    4 
 crypto/scatterwalk.c                         |    3 
 drivers/char/random.c                        |   13 +--
 drivers/infiniband/core/ucm.c                |    4 
 drivers/infiniband/core/ucma.c               |    3 
 drivers/infiniband/core/uverbs_main.c        |    5 +
 drivers/infiniband/hw/ipath/ipath_file_ops.c |    5 +
 drivers/infiniband/hw/qib/qib_file_ops.c     |    5 +
 drivers/net/bonding/bond_netlink.c           |    6 +
 drivers/net/usb/cdc_ncm.c                    |   20 +---
 drivers/scsi/scsi_lib.c                      |  116 +++++++--------------------
 drivers/usb/core/hub.c                       |   23 ++++-
 drivers/usb/core/quirks.c                    |    8 -
 fs/ext4/extents.c                            |    8 +
 fs/ext4/inode.c                              |   35 ++++++--
 fs/ext4/mballoc.c                            |   17 ---
 fs/ext4/super.c                              |   10 ++
 fs/fuse/inode.c                              |    2 
 include/linux/console.h                      |    1 
 include/rdma/ib.h                            |   16 +++
 ipc/msg.c                                    |    2 
 ipc/sem.c                                    |   12 +-
 kernel/panic.c                               |    3 
 kernel/printk/printk.c                       |   35 +++++++-
 mm/migrate.c                                 |   51 +++++++----
 net/ipv4/tcp_input.c                         |   12 ++
 net/ipv4/tcp_output.c                        |    3 
 net/irda/af_irda.c                           |    7 +
 net/sctp/sm_sideeffect.c                     |   42 +++++----
 security/apparmor/apparmorfs.c               |    1 
 37 files changed, 348 insertions(+), 197 deletions(-)

Alan Stern (1):
      USB: fix invalid memory access in hub_activate()

Andy Lutomirski (2):
      x86/mm: Add barriers and document switch_mm()-vs-flush synchronization
      x86/mm: Improve switch_mm() barrier comments

Beniamino Galvani (1):
      bonding: set carrier off for devices created through netlink

Bjørn Mork (1):
      cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind

Christoph Hellwig (1):
      scsi: remove scsi_end_request

Dave Weinstein (1):
      arm: oabi compat: add missing access checks

David Howells (1):
      KEYS: 64-bit MIPS needs to use compat_sys_keyctl for 32-bit userspace

Eric Dumazet (1):
      tcp: make challenge acks less predictable

Fabian Frederick (1):
      sysv, ipc: fix security-layer leaking

Greg Kroah-Hartman (2):
      USB: fix up incorrect quirk
      Linux 3.14.76

Herbert Xu (2):
      crypto: gcm - Filter out async ghash if necessary
      crypto: scatterwalk - Fix test in scatterwalk_done

Hugh Dickins (1):
      mm: migrate dirty page without clear_page_dirty_for_io etc

James Bottomley (1):
      scsi_lib: correctly retry failed zero length REQ_TYPE_FS commands

Jan Kara (1):
      ext4: fix deadlock during page writeback

Jason Gunthorpe (1):
      IB/security: Restrict use of the write() interface

John Johansen (1):
      apparmor: fix ref count leak when profile sha1 hash is read

Karl Heiss (1):
      sctp: Prevent soft lockup when sctp_accept() is called during a timeout event

Soheil Hassas Yeganeh (1):
      tcp: consider recv buf for the initial window scale

Tejun Heo (1):
      printk: do cond_resched() between lines while outputting to consoles

Theodore Ts'o (1):
      random: strengthen input validation for RNDADDTOENTCNT

Vegard Nossum (6):
      block: fix use-after-free in seq file
      ext4: check for extents that wrap around
      ext4: don't call ext4_should_journal_data() on the journal inode
      ext4: short-cut orphan cleanup on error
      net/irda: fix NULL pointer dereference on memory allocation failure
      ext4: fix reference counting bug on block allocation error

Wei Fang (1):
      fuse: fix wrong assignment of ->flags in fuse_send_init()


Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ