lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 5 Oct 2017 10:05:48 +0200
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.18.73

I'm announcing the release of the 3.18.73 kernel.

All users of the 3.18 kernel series must upgrade.

The updated 3.18.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.18.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                  |    2 -
 arch/arm/xen/mm.c                         |    1 
 arch/arm64/kernel/head.S                  |    1 
 arch/powerpc/kvm/book3s_64_vio.c          |   46 +++++++++++++++++-------------
 arch/powerpc/platforms/pseries/mobility.c |    4 +-
 arch/x86/kernel/i387.c                    |   11 +++++++
 arch/x86/kernel/xsave.c                   |    4 +-
 arch/x86/kvm/vmx.c                        |    5 +++
 block/bsg-lib.c                           |    1 
 drivers/crypto/talitos.c                  |    4 +-
 drivers/pci/pci-sysfs.c                   |   11 +++++--
 drivers/scsi/scsi_transport_iscsi.c       |    2 -
 drivers/video/fbdev/aty/atyfb_base.c      |    2 -
 drivers/xen/swiotlb-xen.c                 |   19 ++++++++++++
 fs/btrfs/ioctl.c                          |    4 ++
 fs/cifs/cifsfs.c                          |    2 -
 fs/cifs/connect.c                         |    8 +++++
 fs/cifs/file.c                            |    7 ++++
 fs/cifs/smb2pdu.c                         |   17 +++++++----
 fs/read_write.c                           |    4 +-
 include/linux/key.h                       |    2 +
 include/xen/swiotlb-xen.h                 |    5 +++
 kernel/trace/trace.c                      |   12 +++++--
 net/mac80211/offchannel.c                 |    2 +
 net/wireless/nl80211.c                    |    3 +
 security/keys/internal.h                  |    2 -
 security/keys/key.c                       |    2 +
 security/keys/keyctl.c                    |    5 +++
 security/keys/keyring.c                   |   37 ++++++++++++------------
 security/keys/process_keys.c              |    8 +++--
 30 files changed, 172 insertions(+), 61 deletions(-)

Andreas Gruenbacher (1):
      vfs: Return -ENXIO for negative SEEK_HOLE / SEEK_DATA offsets

Arnd Bergmann (1):
      fix xen_swiotlb_dma_mmap prototype

Avraham Stern (1):
      mac80211: flush hw_roc_start work before cancelling the ROC

Bo Yan (1):
      tracing: Erase irqsoff trace with empty write

Christoph Hellwig (1):
      bsg-lib: don't free job in bsg_prepare_job

Eric Biggers (4):
      KEYS: fix writing past end of user-supplied buffer in keyring_read()
      KEYS: prevent creating a different user's keyrings
      KEYS: prevent KEYCTL_READ on negative key
      x86/fpu: Don't let userspace set bogus xcomp_bv

Greg Kroah-Hartman (1):
      Linux 3.18.73

Jim Mattson (1):
      kvm: nVMX: Don't allow L2 to access the hardware CR8

LEROY Christophe (1):
      crypto: talitos - fix sha224

Marc Zyngier (1):
      arm64: Make sure SPsel is always set

Nicolai Stange (1):
      PCI: Fix race condition with driver_override

Paul Mackerras (1):
      KVM: PPC: Book3S: Fix race and leak in kvm_vm_ioctl_create_spapr_tce()

Shu Wang (2):
      cifs: release cifs root_cred after exit_cifs
      cifs: release auth_key.response for reconnect.

Stefano Stabellini (1):
      swiotlb-xen: implement xen_swiotlb_dma_mmap callback

Steve French (2):
      SMB: Validate negotiate (to protect against downgrade) even if signing off
      SMB3: Don't ignore O_SYNC/O_DSYNC and O_DIRECT flags

Tahsin Erdogan (1):
      tracing: Fix trace_pipe behavior for instance traces

Tyrel Datwyler (1):
      powerpc/pseries: Fix parent_dn reference leak in add_dt_node()

Vladis Dronov (2):
      nl80211: check for the required netlink attributes presence
      video: fbdev: aty: do not leak uninitialized padding in clk to userspace

Xin Long (1):
      scsi: scsi_transport_iscsi: fix the issue that iscsi_if_rx doesn't parse nlmsg properly

satoru takeuchi (1):
      btrfs: prevent to set invalid default subvolid


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ