[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <16306597601523@kroah.com>
Date: Fri, 3 Sep 2021 11:02:40 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, jslaby@...e.cz,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: Linux 5.14.1
I'm announcing the release of the 5.14.1 kernel.
All users of the 5.14 kernel series must upgrade.
The updated 5.14.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.14.y
and can be browsed at the normal kernel.org git web browser:
https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Makefile | 2 +-
drivers/block/floppy.c | 30 +++++++++++++++---------------
drivers/bluetooth/btusb.c | 22 ++++++++++++++--------
drivers/net/dsa/mt7530.c | 5 +----
drivers/tty/vt/vt_ioctl.c | 10 ++++++----
fs/btrfs/volumes.c | 2 +-
fs/crypto/hooks.c | 44 ++++++++++++++++++++++++++++++++++++++++++++
fs/ext4/symlink.c | 12 +++++++++++-
fs/f2fs/namei.c | 12 +++++++++++-
fs/ubifs/file.c | 13 ++++++++++++-
include/linux/fscrypt.h | 7 +++++++
include/linux/netdevice.h | 4 ++++
kernel/audit_tree.c | 2 +-
net/socket.c | 6 +++++-
14 files changed, 133 insertions(+), 38 deletions(-)
DENG Qingfang (1):
net: dsa: mt7530: fix VLAN traffic leaks again
Denis Efremov (1):
Revert "floppy: reintroduce O_NDELAY fix"
Eric Biggers (4):
fscrypt: add fscrypt_symlink_getattr() for computing st_size
ext4: report correct st_size for encrypted symlinks
f2fs: report correct st_size for encrypted symlinks
ubifs: report correct st_size for encrypted symlinks
Greg Kroah-Hartman (1):
Linux 5.14.1
Linus Torvalds (1):
vt_kdsetmode: extend console locking
Pauli Virtanen (1):
Bluetooth: btusb: check conditions before enabling USB ALT 3 for WBS
Peter Collingbourne (1):
net: don't unconditionally copy_from_user a struct ifreq for socket ioctls
Qu Wenruo (1):
btrfs: fix NULL pointer dereference when deleting device by invalid id
Richard Guy Briggs (1):
audit: move put_tree() to avoid trim_trees refcount underflow and UAF
Powered by blists - more mailing lists