lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20190504071831.GA12815@kroah.com>
Date:   Sat, 4 May 2019 09:18:31 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     Pavel Machek <pavel@...x.de>
Cc:     linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
        akpm@...ux-foundation.org, linux@...ck-us.net, shuah@...nel.org,
        patches@...nelci.org, ben.hutchings@...ethink.co.uk,
        lkft-triage@...ts.linaro.org, stable@...r.kernel.org
Subject: Re: [PATCH 4.19 00/72] 4.19.39-stable review

On Sat, May 04, 2019 at 08:54:47AM +0200, Pavel Machek wrote:
> On Thu 2019-05-02 17:20:22, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 4.19.39 release.
> > There are 72 patches in this series, all will be posted as a response
> > to this one.  If anyone has any issues with these being applied, please
> > let me know.
> > 
> > Responses should be made by Sat 04 May 2019 02:32:17 PM UTC.
> > Anything received after that time might be too late.
> 
> These do not meet stable criteria afaict: (3-5... I see this is
> probably security bug; it would be good to mention in the preparation
> patches what is going on because otherwise it is tricky to understand).

I do not do "explain why specific patches are applied" because yes,
sometimes it is due to security issues that we know about.

> ?? 03/72] mm: make page ref count overflow check tighter and m -- not sure description is good enough; preparation for later changes?
> ?? 04/72] mm: add try_get_page() helper function -- adds unused function
> ?? 05/72] mm: prevent get_user_pages() from overflowing page r -- over
>   100 line limit and depedns on previous patches. get_gate_page() change
>   not in -rc?.. it is in -next.

These are all well-known as solving a public security issue, please see
lkml for the details, no need for you to "guess".

thanks for the review.

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ