[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170614134310.GA5358@kroah.com>
Date: Wed, 14 Jun 2017 15:43:10 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.18.57
I'm announcing the release of the 3.18.57 kernel.
All users of the 3.18 kernel series must upgrade.
The updated 3.18.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.18.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Makefile | 2
arch/arm/kvm/init.S | 5 --
arch/arm64/include/asm/asm-uaccess.h | 13 +++++
arch/arm64/include/asm/barrier.h | 10 +++-
arch/arm64/include/asm/uaccess.h | 8 +++
arch/arm64/kernel/entry.S | 6 +-
arch/arm64/kernel/hw_breakpoint.c | 3 -
arch/powerpc/include/asm/topology.h | 14 +++++
arch/powerpc/kernel/eeh_driver.c | 19 ++++++-
arch/powerpc/kernel/setup_64.c | 4 -
arch/x86/kernel/kvm.c | 2
arch/x86/kvm/cpuid.c | 20 ++++----
crypto/gcm.c | 6 --
drivers/char/mem.c | 2
drivers/char/random.c | 26 ++++++++++
drivers/dma/ep93xx_dma.c | 2
drivers/gpu/drm/vmwgfx/vmwgfx_fifo.c | 2
drivers/gpu/drm/vmwgfx/vmwgfx_surface.c | 3 +
drivers/iio/proximity/as3935.c | 4 -
drivers/infiniband/hw/mlx5/main.c | 2
drivers/infiniband/hw/qib/qib_rc.c | 4 +
drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c | 2
drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c | 4 +
drivers/net/ethernet/ethoc.c | 3 -
drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 2
drivers/net/ethernet/mellanox/mlx5/core/main.c | 2
drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c | 2
drivers/scsi/qla2xxx/qla_os.c | 8 +--
drivers/staging/lustre/lustre/lov/lov_pack.c | 9 ---
drivers/tty/serial/ifx6x60.c | 2
drivers/tty/serial/sh-sci.c | 10 ++--
drivers/usb/chipidea/debug.c | 3 -
drivers/usb/chipidea/udc.c | 8 ++-
drivers/usb/gadget/function/f_mass_storage.c | 13 ++++-
fs/btrfs/extent-tree.c | 1
fs/btrfs/inode.c | 4 -
fs/ext4/file.c | 50 +++++---------------
fs/ext4/inode.c | 5 +-
fs/nfsd/nfs4proc.c | 13 ++---
include/linux/bitops.h | 11 ++++
include/linux/random.h | 1
include/net/ipv6.h | 1
kernel/events/core.c | 21 ++++++++
kernel/fork.c | 2
lib/test_user_copy.c | 20 +++++++-
net/ipv4/af_inet.c | 2
net/ipv4/tcp_cong.c | 1
net/ipv6/ip6_offload.c | 4 +
net/ipv6/ping.c | 2
net/ipv6/raw.c | 2
net/ipv6/xfrm6_mode_ro.c | 2
net/ipv6/xfrm6_mode_transport.c | 2
security/keys/key.c | 5 --
security/keys/keyctl.c | 4 -
sound/core/timer.c | 5 ++
sound/soc/soc-core.c | 5 +-
56 files changed, 264 insertions(+), 124 deletions(-)
Alexander Sverdlin (1):
dmaengine: ep93xx: Always start from BASE0
Ben Hutchings (1):
ipv6: xfrm: Handle errors reported by xfrm6_find_1stfragopt()
Christoph Hellwig (1):
mlx5: stop including <asm-generic/kmap_types.h>
Dan Carpenter (1):
drm/vmwgfx: Handle vmalloc() failure in vmw_local_fifo_reserve()
Daniel Cashman (1):
drivers: char: random: add get_random_long()
Daniel Micay (1):
stackprotector: Increase the per-task stack canary's random range from 32 bits to 64 bits on 64-bit platforms
David S. Miller (1):
ipv6: Fix leak in ipv6_gso_segment().
David Sterba (1):
btrfs: use correct types for page indices in btrfs_page_exists_in_range
Eric Biggers (3):
KEYS: fix dereferencing NULL payload with nonzero length
KEYS: fix freeing uninitialized memory in key_update()
random: properly align get_random_int_hash
Eric Dumazet (1):
net: ping: do not abuse udp_poll()
Ganesh Goudar (1):
cxgb4: avoid enabling napi twice to the same queue
Gilad Ben-Yossef (1):
crypto: gcm - wait for crypto op not signal safe
Greg Kroah-Hartman (1):
Linux 3.18.57
J. Bruce Fields (1):
nfsd4: fix null dereference on replay
Jan Kara (1):
ext4: fix SEEK_HOLE
Jeff Mahoney (1):
btrfs: fix memory leak in update_space_info failure path
Jin Yao (1):
perf/core: Drop kernel samples even though :u is specified
Jisheng Zhang (1):
usb: chipidea: udc: fix NULL pointer dereference if udc_start failed
Johan Hovold (1):
serial: ifx6x60: fix use-after-free on module unload
Johannes Thumshirn (1):
scsi: qla2xxx: don't disable a not previously enabled PCI device
Julius Werner (1):
drivers: char: mem: Fix wraparound check to allow mappings up to the end
Kees Cook (1):
usercopy: Adjust tests to deal with SMAP/PAN
Konstantin Khlebnikov (1):
ext4: keep existing extra fields when inode expands
Kristina Martsenko (2):
arm64: hw_breakpoint: fix watchpoint matching for tagged pointers
arm64: entry: improve data abort handling of tagged pointers
Marc Zyngier (1):
arm: KVM: Allow unaligned accesses at HYP
Mark Rutland (1):
arm64: ensure extension of smp_store_release value
Matt Ranostay (1):
iio: proximity: as3935: fix AS3935_INT mask
Max Filippov (1):
net: ethoc: enable NAPI before poll may be scheduled
Michael Ellerman (1):
powerpc/numa: Fix percpu allocations to be NUMA aware
Michael Thalmeier (1):
usb: chipidea: debug: check before accessing ci_role
Mike Marciniszyn (1):
RDMA/qib,hfi1: Fix MR reference count leak on write with immediate
Mintz, Yuval (1):
bnx2x: Fix Multi-Cos
Oleg Drokin (1):
staging/lustre/lov: remove set_fs() call from lov_getstripe()
Paolo Bonzini (1):
kvm: async_pf: fix rcu_irq_enter() with irqs enabled
Russell Currey (1):
powerpc/eeh: Avoid use after free in eeh_handle_special_event()
Takashi Iwai (3):
ALSA: timer: Fix missing queue indices reset at SNDRV_TIMER_IOCTL_SELECT
ASoC: Fix use-after-free at card unregistration
ALSA: timer: Fix race between read and ioctl
Takatoshi Akiyama (1):
serial: sh-sci: Fix panic when serial console and DMA are enabled
Thinh Nguyen (1):
usb: gadget: f_mass_storage: Serialize wake and sleep execution
Vladis Dronov (1):
drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl()
Wanpeng Li (1):
KVM: cpuid: Fix read/write out-of-bounds vulnerability in cpuid emulation
Yuchung Cheng (1):
tcp: disallow cwnd undo when switching congestion control
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists