lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <164396730424.21109.15121913505546223213@beryllium.lan>
Date:   Fri, 4 Feb 2022 10:45:17 +0100
From:   Daniel Wagner <wagi@...om.org>
To:     LKML <linux-kernel@...r.kernel.org>,
        linux-rt-users <linux-rt-users@...r.kernel.org>
Cc:     Steven Rostedt <rostedt@...dmis.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Carsten Emde <C.Emde@...dl.org>,
        John Kacur <jkacur@...hat.com>,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>,
        Tom Zanussi <tom.zanussi@...ux.intel.com>,
        Clark Williams <williams@...hat.com>,
        Pavel Machek <pavel@...x.de>
Subject: [ANNOUNCE] 4.4.302-rt232 (END OF LIFE)

Hello RT-list!

I'm pleased to announce the 4.4.302-rt232 stable release.

This is an update to the v4.4 stable update[1]. No RT specific changes.

The v4.4-rt branch is END OF LIFE. There wont be any v4.4-rt updates
from the stable-rt community anymore as the stable v4.4 branch reached
END OF LIFE as well. As Greg indicated the CIP project is considering to
support v4.4 a bit longer.

You can get this release via the git tree at:

  git://git.kernel.org/pub/scm/linux/kernel/git/rt/linux-stable-rt.git

  branch: v4.4-rt
  Head SHA1: 334a53b5f6c3f92cfe37ba1083fe3dd06eac1df4

Or to build 4.4.302-rt232 directly, the following patches should be applied:

  https://www.kernel.org/pub/linux/kernel/v4.x/linux-4.4.tar.xz

  https://www.kernel.org/pub/linux/kernel/v4.x/patch-4.4.302.xz

  https://www.kernel.org/pub/linux/kernel/projects/rt/4.4/patch-4.4.302-rt232.patch.xz

Signing key fingerprint:

  5BF6 7BC5 0826 72CA BB45  ACAE 587C 5ECA 5D0A 306C

Enjoy!
Daniel

[1] https://lore.kernel.org/stable/1643877137240249@kroah.com/


Changes from v4.4.301-rt231:
---

Alan Stern (2):
      usb-storage: Add unusual-devs entry for VL817 USB-SATA bridge
      USB: core: Fix hang in usb_kill_urb by adding memory barriers

Brian Gix (1):
      Bluetooth: refactor malicious adv data check

Cameron Williams (1):
      tty: Add support for Brainboxes UC cards.

Congyu Liu (1):
      net: fix information leakage in /proc/net/ptype

Daniel Wagner (2):
      Merge tag 'v4.4.302' into v4.4-rt
      Linux 4.4.302-rt232

Eric Dumazet (3):
      ipv4: avoid using shared IP generator for connected sockets
      ipv4: raw: lock the socket in raw_bind()
      ipv4: tcp: send zero IPID in SYNACK messages

Greg Kroah-Hartman (2):
      PM: wakeup: simplify the output logic of pm_show_wakelocks()
      Linux 4.4.302

Guenter Roeck (1):
      hwmon: (lm90) Reduce maximum conversion rate for G781

Guillaume Bertholon (5):
      Bluetooth: MGMT: Fix misplaced BT_HS check
      Revert "drm/radeon/ci: disable mclk switching for high refresh rates (v2)"
      Revert "tc358743: fix register i2c_rd/wr function fix"
      KVM: x86: Fix misplaced backport of "work around leak of uninitialized stack contents"
      Input: i8042 - Fix misplaced backport of "add ASUS Zenbook Flip to noselftest list"

Ido Schimmel (1):
      ipv6_tunnel: Rate limit warning messages

Jan Kara (2):
      udf: Restore i_lenAlloc when inode expansion fails
      udf: Fix NULL ptr deref when converting from inline format

Jianguo Wu (1):
      net-procfs: show net devices bound packet types

John Meneghini (1):
      scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

Steffen Maier (1):
      scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP devices

Valentin Caron (1):
      serial: stm32: fix software flow control transfer

Vasily Gorbik (1):
      s390/hypfs: include z/VM guests with access control group set

Xianting Tian (1):
      drm/msm: Fix wrong size calculation

Ziyang Xuan (1):
      can: bcm: fix UAF of bcm op

daniel.starke@...mens.com (1):
      tty: n_gsm: fix SW flow control encoding/handling

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ