lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1661088945124200@kroah.com>
Date:   Sun, 21 Aug 2022 15:35:44 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, jslaby@...e.cz,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: Linux 5.19.3

I'm announcing the release of the 5.19.3 kernel.

All users of the 5.19 kernel series must upgrade.

The updated 5.19.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.19.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                          |    2 -
 arch/arm64/kernel/kexec_image.c   |   11 ------
 arch/x86/kernel/kexec-bzimage64.c |   20 -----------
 drivers/tee/tee_shm.c             |    3 +
 fs/btrfs/raid56.c                 |   68 ++++++++++++++++++++++++++++++--------
 include/linux/kexec.h             |    7 +++
 kernel/kexec_file.c               |   17 +++++++++
 mm/kfence/core.c                  |   18 +++++-----
 net/sched/cls_route.c             |   10 +++++
 9 files changed, 104 insertions(+), 52 deletions(-)

Coiby Xu (2):
      kexec, KEYS: make the code in bzImage64_verify_sig generic
      arm64: kexec_file: use more system keyrings to verify kernel image signature

Greg Kroah-Hartman (1):
      Linux 5.19.3

Jamal Hadi Salim (1):
      net_sched: cls_route: disallow handle of 0

Jens Wiklander (1):
      tee: add overflow check in register_shm_helper()

Marco Elver (1):
      Revert "mm: kfence: apply kmemleak_ignore_phys on early allocated pool"

Qu Wenruo (2):
      btrfs: only write the sectors in the vertical stripe which has data stripes
      btrfs: raid56: don't trust any cached sector in __raid56_parity_recover()

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ