lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210802134334.081433902@linuxfoundation.org>
Date:   Mon,  2 Aug 2021 15:44:38 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
        lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
        f.fainelli@...il.com, stable@...r.kernel.org
Subject: [PATCH 4.19 00/30] 4.19.201-rc1 review

This is the start of the stable review cycle for the 4.19.201 release.
There are 30 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed, 04 Aug 2021 13:43:24 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.201-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.19.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.19.201-rc1

Lukasz Cieplicki <lukaszx.cieplicki@...el.com>
    i40e: Add additional info to PHY type error

Arnaldo Carvalho de Melo <acme@...hat.com>
    Revert "perf map: Fix dso->nsinfo refcounting"

Srikar Dronamraju <srikar@...ux.vnet.ibm.com>
    powerpc/pseries: Fix regression while building external modules

Dan Carpenter <dan.carpenter@...cle.com>
    can: hi311x: fix a signedness bug in hi3110_cmd()

Wang Hai <wanghai38@...wei.com>
    sis900: Fix missing pci_disable_device() in probe and remove

Wang Hai <wanghai38@...wei.com>
    tulip: windbond-840: Fix missing pci_disable_device() in probe and remove

Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
    sctp: fix return value check in __sctp_rcv_asconf_lookup

Maor Gottlieb <maorg@...dia.com>
    net/mlx5: Fix flow table chaining

Pavel Skripkin <paskripkin@...il.com>
    net: llc: fix skb_over_panic

Jiapeng Chong <jiapeng.chong@...ux.alibaba.com>
    mlx4: Fix missing error code in mlx4_load_one()

Hoang Le <hoang.h.le@...tech.com.au>
    tipc: fix sleeping in tipc accept routine

Jedrzej Jagielski <jedrzej.jagielski@...el.com>
    i40e: Fix log TC creation failure when max num of queues is exceeded

Arkadiusz Kubalewski <arkadiusz.kubalewski@...el.com>
    i40e: Fix logic of disabling queues

Pablo Neira Ayuso <pablo@...filter.org>
    netfilter: nft_nat: allow to specify layer 4 protocol NAT only

Florian Westphal <fw@...len.de>
    netfilter: conntrack: adjust stop timestamp to real expiry value

Nguyen Dinh Phi <phind.uet@...il.com>
    cfg80211: Fix possible memory leak in function cfg80211_bss_update

Krzysztof Kozlowski <krzysztof.kozlowski@...onical.com>
    nfc: nfcsim: fix use after free during module unload

Paul Jakma <paul@...ma.org>
    NIU: fix incorrect error return, missed in previous revert

Pavel Skripkin <paskripkin@...il.com>
    can: esd_usb2: fix memory leak

Pavel Skripkin <paskripkin@...il.com>
    can: ems_usb: fix memory leak

Pavel Skripkin <paskripkin@...il.com>
    can: usb_8dev: fix memory leak

Pavel Skripkin <paskripkin@...il.com>
    can: mcba_usb_start(): add missing urb->transfer_dma initialization

Ziyang Xuan <william.xuanziyang@...wei.com>
    can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF

Junxiao Bi <junxiao.bi@...cle.com>
    ocfs2: issue zeroout to EOF blocks

Junxiao Bi <junxiao.bi@...cle.com>
    ocfs2: fix zero out valid data

Juergen Gross <jgross@...e.com>
    x86/kvm: fix vcpu-id indexed array sizes

Desmond Cheong Zhi Xi <desmondcheongzx@...il.com>
    btrfs: fix rw device counting in __btrfs_free_extra_devids

Jan Kiszka <jan.kiszka@...mens.com>
    x86/asm: Ensure asm/proto.h can be included stand-alone

Eric Dumazet <edumazet@...gle.com>
    gro: ensure frag0 meets IP header alignment

Eric Dumazet <edumazet@...gle.com>
    virtio_net: Do not pull payload in skb->head


-------------

Diffstat:

 Makefile                                          |   4 +-
 arch/powerpc/platforms/pseries/setup.c            |   2 +-
 arch/x86/include/asm/proto.h                      |   2 +
 arch/x86/kvm/ioapic.c                             |   2 +-
 arch/x86/kvm/ioapic.h                             |   4 +-
 drivers/net/can/spi/hi311x.c                      |   2 +-
 drivers/net/can/usb/ems_usb.c                     |  14 ++-
 drivers/net/can/usb/esd_usb2.c                    |  16 +++-
 drivers/net/can/usb/mcba_usb.c                    |   2 +
 drivers/net/can/usb/usb_8dev.c                    |  15 +++-
 drivers/net/ethernet/dec/tulip/winbond-840.c      |   7 +-
 drivers/net/ethernet/intel/i40e/i40e_ethtool.c    |   2 +-
 drivers/net/ethernet/intel/i40e/i40e_main.c       |  60 ++++++++-----
 drivers/net/ethernet/mellanox/mlx4/main.c         |   1 +
 drivers/net/ethernet/mellanox/mlx5/core/fs_core.c |  10 ++-
 drivers/net/ethernet/sis/sis900.c                 |   7 +-
 drivers/net/ethernet/sun/niu.c                    |   3 +-
 drivers/net/virtio_net.c                          |  10 ++-
 drivers/nfc/nfcsim.c                              |   3 +-
 fs/btrfs/volumes.c                                |   1 +
 fs/ocfs2/file.c                                   | 103 +++++++++++++---------
 include/linux/skbuff.h                            |   9 ++
 include/linux/virtio_net.h                        |  14 +--
 include/net/llc_pdu.h                             |  31 +++++--
 net/can/raw.c                                     |  20 ++++-
 net/core/dev.c                                    |   3 +-
 net/llc/af_llc.c                                  |  10 ++-
 net/llc/llc_s_ac.c                                |   2 +-
 net/netfilter/nf_conntrack_core.c                 |   7 +-
 net/netfilter/nft_nat.c                           |   4 +-
 net/sctp/input.c                                  |   2 +-
 net/tipc/socket.c                                 |   9 +-
 net/wireless/scan.c                               |   6 +-
 tools/perf/util/map.c                             |   2 -
 34 files changed, 260 insertions(+), 129 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ