lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240523130329.745905823@linuxfoundation.org>
Date: Thu, 23 May 2024 15:13:27 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: stable@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	patches@...ts.linux.dev,
	linux-kernel@...r.kernel.org,
	torvalds@...ux-foundation.org,
	akpm@...ux-foundation.org,
	linux@...ck-us.net,
	shuah@...nel.org,
	patches@...nelci.org,
	lkft-triage@...ts.linaro.org,
	pavel@...x.de,
	jonathanh@...dia.com,
	f.fainelli@...il.com,
	sudipm.mukherjee@...il.com,
	srw@...dewatkins.net,
	rwarsow@....de,
	conor@...nel.org,
	allen.lkml@...il.com,
	broonie@...nel.org
Subject: [PATCH 6.8 00/23] 6.8.11-rc1 review

This is the start of the stable review cycle for the 6.8.11 release.
There are 23 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sat, 25 May 2024 13:03:15 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.8.11-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.8.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 6.8.11-rc1

Christoph Hellwig <hch@....de>
    block: add a partscan sysfs attribute for disks

Christoph Hellwig <hch@....de>
    block: add a disk_has_partscan helper

SeongJae Park <sj@...nel.org>
    Docs/admin-guide/mm/damon/usage: fix wrong example of DAMOS filter matching sysfs file

Akira Yokosawa <akiyks@...il.com>
    docs: kernel_include.py: Cope with docutils 0.21

Thomas Weißschuh <linux@...ssschuh.net>
    admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET

Jarkko Sakkinen <jarkko@...nel.org>
    KEYS: trusted: Do not use WARN when encode fails

AngeloGioacchino Del Regno <angelogioacchino.delregno@...labora.com>
    remoteproc: mediatek: Make sure IPI buffer fits in L2TCM

Daniel Thompson <daniel.thompson@...aro.org>
    serial: kgdboc: Fix NMI-safety problems from keyboard reset code

Javier Carrasco <javier.carrasco@...fvision.net>
    usb: typec: tipd: fix event checking for tps6598x

Javier Carrasco <javier.carrasco@...fvision.net>
    usb: typec: tipd: fix event checking for tps25750

Heikki Krogerus <heikki.krogerus@...ux.intel.com>
    usb: typec: ucsi: displayport: Fix potential deadlock

Jose Ignacio Tornos Martinez <jtornosm@...hat.com>
    net: usb: ax88179_178a: fix link status when link is set to down/up

Prashanth K <quic_prashk@...cinc.com>
    usb: dwc3: Wait unconditionally after issuing EndXfer command

Carlos Llamas <cmllamas@...gle.com>
    binder: fix max_thread type inconsistency

Christian Brauner <brauner@...nel.org>
    erofs: reliably distinguish block based and fscache mode

Baokun Li <libaokun1@...wei.com>
    erofs: get rid of erofs_fs_context

Jarkko Sakkinen <jarkko@...nel.org>
    KEYS: trusted: Fix memory leak in tpm2_key_encode()

Sungwoo Kim <iam@...g-woo.kim>
    Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()

Sungwoo Kim <iam@...g-woo.kim>
    Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()

Jacob Keller <jacob.e.keller@...el.com>
    ice: remove unnecessary duplicate checks for VF VSI ID

Jacob Keller <jacob.e.keller@...el.com>
    ice: pass VSI pointer into ice_vc_isvalid_q_id

Ronald Wahl <ronald.wahl@...itan.com>
    net: ks8851: Fix another TX stall caused by wrong ISR flag handling

Jose Fernandez <josef@...flix.com>
    drm/amd/display: Fix division by zero in setup_dsc_config


-------------

Diffstat:

 Documentation/ABI/stable/sysfs-block               |  10 ++
 .../admin-guide/hw-vuln/core-scheduling.rst        |   4 +-
 Documentation/admin-guide/mm/damon/usage.rst       |   2 +-
 Documentation/sphinx/kernel_include.py             |   1 -
 Makefile                                           |   4 +-
 block/genhd.c                                      |  15 ++-
 block/partitions/core.c                            |   5 +-
 drivers/android/binder.c                           |   2 +-
 drivers/android/binder_internal.h                  |   2 +-
 drivers/gpu/drm/amd/display/dc/dsc/dc_dsc.c        |   7 +-
 drivers/net/ethernet/intel/ice/ice_virtchnl.c      |  22 ++--
 drivers/net/ethernet/intel/ice/ice_virtchnl_fdir.c |   3 -
 drivers/net/ethernet/micrel/ks8851_common.c        |  18 +--
 drivers/net/usb/ax88179_178a.c                     |  37 ++++--
 drivers/remoteproc/mtk_scp.c                       |  10 +-
 drivers/tty/serial/kgdboc.c                        |  30 ++++-
 drivers/usb/dwc3/gadget.c                          |   4 +-
 drivers/usb/typec/tipd/core.c                      |  51 ++++++---
 drivers/usb/typec/tipd/tps6598x.h                  |  11 ++
 drivers/usb/typec/ucsi/displayport.c               |   4 -
 fs/erofs/internal.h                                |   7 --
 fs/erofs/super.c                                   | 124 +++++++++------------
 include/linux/blkdev.h                             |  13 +++
 include/net/bluetooth/hci.h                        |   9 ++
 include/net/bluetooth/hci_core.h                   |   1 +
 net/bluetooth/hci_conn.c                           |  71 ++++++++----
 net/bluetooth/hci_event.c                          |  31 ++++--
 net/bluetooth/iso.c                                |   2 +-
 net/bluetooth/l2cap_core.c                         |  38 +++----
 net/bluetooth/sco.c                                |   6 +-
 security/keys/trusted-keys/trusted_tpm2.c          |  25 ++++-
 31 files changed, 339 insertions(+), 230 deletions(-)



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ