lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <16773219832135@kroah.com>
Date:   Sat, 25 Feb 2023 11:46:24 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, jslaby@...e.cz,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: Linux 6.2.1

I'm announcing the release of the 6.2.1 kernel.

All users of the 6.2 kernel series must upgrade.

The updated 6.2.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-6.2.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 MAINTAINERS                                    |    2 
 Makefile                                       |    2 
 arch/x86/include/asm/text-patching.h           |   31 ++++++++++++
 arch/x86/kernel/alternative.c                  |   62 ++++++++++++++++++-------
 arch/x86/kernel/kprobes/core.c                 |   38 +++------------
 arch/x86/kernel/static_call.c                  |   50 ++++++++++++++++++--
 drivers/hid/hid-mcp2221.c                      |    3 +
 drivers/net/wireless/marvell/mwifiex/sdio.c    |    1 
 drivers/platform/x86/amd/pmf/Kconfig           |    1 
 drivers/platform/x86/nvidia-wmi-ec-backlight.c |    6 ++
 fs/ext4/sysfs.c                                |    7 ++
 include/linux/nospec.h                         |    4 +
 kernel/bpf/core.c                              |    3 -
 lib/usercopy.c                                 |    7 ++
 security/Kconfig.hardening                     |    3 +
 15 files changed, 166 insertions(+), 54 deletions(-)

Benjamin Tissoires (1):
      HID: mcp-2221: prevent UAF in delayed work

Dave Hansen (1):
      uaccess: Add speculation barrier to copy_from_user()

Eric Biggers (1):
      randstruct: disable Clang 15 support

Greg Kroah-Hartman (1):
      Linux 6.2.1

Hans de Goede (1):
      platform/x86: nvidia-wmi-ec-backlight: Add force module parameter

Kees Cook (1):
      ext4: Fix function prototype mismatch for ext4_feat_ktype

Linus Torvalds (1):
      bpf: add missing header file include

Lukas Wunner (1):
      wifi: mwifiex: Add missing compatible string for SD8787

Paul Moore (1):
      audit: update the mailing list in MAINTAINERS

Peter Zijlstra (3):
      x86/alternatives: Introduce int3_emulate_jcc()
      x86/alternatives: Teach text_poke_bp() to patch Jcc.d32 instructions
      x86/static_call: Add support for Jcc tail-calls

Shyam Sundar S K (1):
      platform/x86/amd/pmf: Add depends on CONFIG_POWER_SUPPLY

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ