lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190113095352.GA16302@kroah.com>
Date:   Sun, 13 Jan 2019 10:53:52 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 3.18.132

I'm announcing the release of the 3.18.132 kernel.

All users of the 3.18 kernel series must upgrade.

The updated 3.18.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.18.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                           |    2 
 arch/mips/boot/compressed/calc_vmlinuz_load_addr.c |    7 +-
 arch/mips/include/asm/pgtable-64.h                 |    5 +
 arch/x86/include/asm/kvm_host.h                    |    2 
 arch/x86/kernel/cpu/mtrr/if.c                      |    2 
 drivers/gpio/gpio-max7301.c                        |   12 ---
 drivers/hv/vmbus_drv.c                             |   20 ++++++
 drivers/isdn/capi/kcapi.c                          |    4 -
 drivers/media/platform/vivid/vivid-vid-cap.c       |    2 
 drivers/misc/genwqe/card_utils.c                   |    2 
 drivers/mmc/core/mmc.c                             |    4 -
 drivers/mmc/host/omap_hsmmc.c                      |   12 +++
 drivers/net/ethernet/ibm/ibmveth.c                 |    6 +
 drivers/net/usb/hso.c                              |   18 +++++
 drivers/net/wireless/b43/phy_common.c              |    2 
 drivers/net/xen-netfront.c                         |    2 
 drivers/power/olpc_battery.c                       |    4 -
 drivers/s390/scsi/zfcp_aux.c                       |    6 -
 drivers/usb/class/cdc-acm.c                        |   10 +++
 drivers/usb/class/cdc-acm.h                        |    1 
 drivers/usb/host/r8a66597-hcd.c                    |    5 +
 drivers/usb/serial/option.c                        |    7 +-
 drivers/usb/serial/pl2303.c                        |    5 +
 drivers/usb/serial/pl2303.h                        |    5 +
 drivers/vhost/vhost.c                              |    2 
 fs/ceph/caps.c                                     |    1 
 fs/cifs/smb2maperror.c                             |    4 -
 fs/dlm/lock.c                                      |   17 +++--
 fs/dlm/lockspace.c                                 |    2 
 fs/ext4/inline.c                                   |    5 +
 fs/ext4/super.c                                    |   13 +++-
 fs/gfs2/rgrp.c                                     |    2 
 include/net/sock.h                                 |   36 ++++++++++-
 include/trace/events/ext4.h                        |   20 ++++++
 kernel/fork.c                                      |   13 +++-
 net/9p/client.c                                    |   21 ++++++
 net/ax25/af_ax25.c                                 |   11 ++-
 net/ax25/ax25_dev.c                                |    2 
 net/compat.c                                       |   15 ++--
 net/core/sock.c                                    |    3 
 net/ipv6/ip6_udp_tunnel.c                          |    3 
 net/netrom/af_netrom.c                             |   15 +++-
 net/packet/af_packet.c                             |    8 +-
 net/sctp/ipv6.c                                    |    1 
 net/sunrpc/auth_gss/svcauth_gss.c                  |    8 +-
 net/sunrpc/cache.c                                 |    9 ++
 net/sunrpc/svcsock.c                               |    2 
 net/vmw_vsock/vmci_transport.c                     |   67 +++++++++++++++------
 sound/pci/cs46xx/dsp_spos.c                        |    3 
 sound/usb/mixer.c                                  |   10 ++-
 sound/usb/quirks-table.h                           |    3 
 51 files changed, 351 insertions(+), 90 deletions(-)

Andreas Gruenbacher (1):
      gfs2: Fix loop in gfs2_rbm_find

Christian Borntraeger (1):
      genwqe: Fix size check

Christophe Leroy (1):
      gpio: max7301: fix driver for use with CONFIG_VMAP_STACK

Colin Ian King (1):
      x86/mtrr: Don't copy uninitialized gentry fields back to userspace

Cong Wang (3):
      ax25: fix a use-after-free in ax25_fillin_cb()
      ipv6: explicitly initialize udp6_addr in udp_sock_create6()
      netrom: fix locking in nr_find_socket()

Dan Carpenter (1):
      ALSA: cs46xx: Potential NULL dereference in probe

David Herrmann (1):
      fork: record start_time late

Deepa Dinamani (1):
      sock: Make sock->sk_stamp thread-safe

Dexuan Cui (1):
      Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels

Dominique Martinet (1):
      9p/net: put a lower bound on msize

Eric Dumazet (1):
      isdn: fix kernel-infoleak in capi_unlocked_ioctl

Georgy A Bystrenin (1):
      CIFS: Fix error mapping for SMB2_LOCK command which caused OFD lock problem

Greg Kroah-Hartman (1):
      Linux 3.18.132

Hans Verkuil (1):
      media: vivid: free bitmap_cap when updating std/timings/etc.

Huacai Chen (2):
      MIPS: Ensure pmd_present() returns false after pmd_mknotpresent()
      MIPS: Align kernel load address to 64KB

Hui Peng (2):
      USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data
      ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks

Jason Wang (1):
      vhost: make sure used idx is seen before log in vhost_add_used_n()

Jia-Ju Bai (1):
      usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable()

Jorgen Hansen (1):
      VSOCK: Send reset control packet when socket is partially bound

Juergen Gross (1):
      xen/netfront: tolerate frags with no data

Larry Finger (1):
      b43: Fix error in cordic routine

Lubomir Rintel (1):
      power: supply: olpc_battery: correct the temperature units

Macpaul Lin (1):
      cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader.

Maurizio Lombardi (1):
      ext4: missing unlock/put_page() in ext4_try_to_write_inline_data()

Pan Bian (1):
      ext4: fix possible use after free in ext4_quota_enable

Russell King (1):
      mmc: omap_hsmmc: fix DMA API warning

Scott Chen (1):
      USB: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays

Sean Christopherson (1):
      KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup

Steffen Maier (1):
      scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown

Takashi Iwai (1):
      ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()

Theodore Ts'o (1):
      ext4: force inode writes when nfsd calls commit_metadata()

Tore Anderson (1):
      USB: serial: option: add HP lt4132

Tyrel Datwyler (1):
      ibmveth: fix DMA unmap error in ibmveth_xmit_start error path

Ulf Hansson (1):
      mmc: core: Reset HPI enabled state during re-init and in case of errors

Vasily Averin (6):
      sunrpc: fix cache_head leak due to queued request
      sunrpc: use SVC_NET() in svcauth_gss_* functions
      dlm: fixed memory leaks after failed ls_remove_names allocation
      dlm: possible memory leak on error path in create_lkb()
      dlm: lost put_lkb on error path in receive_convert() and receive_unlock()
      dlm: memory leaks on error path in dlm_user_request()

Willem de Bruijn (2):
      packet: validate address length
      packet: validate address length if non-zero

Xin Long (1):
      sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event

Yan, Zheng (1):
      ceph: don't update importing cap's mseq when handing cap export


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ