From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E12F5EF5865 for ; Mon, 23 Feb 2026 04:37:22 +0000 (UTC) Received: from mo4-p01-ob.smtp.rzone.de (mo4-p01-ob.smtp.rzone.de [81.169.146.164]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.29325.1771821436550482486 for ; Sun, 22 Feb 2026 20:37:17 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@fpond.eu header.s=strato-dkim-0002 header.b=CqFhc7kA; dkim=pass header.i=@fpond.eu header.s=strato-dkim-0003 header.b=Oprvm4VD; spf=none, err=permanent DNS error (domain: fpond.eu, ip: 81.169.146.164, mailfrom: uli@fpond.eu) ARC-Seal: i=1; a=rsa-sha256; t=1771821407; cv=none; d=strato.com; s=strato-dkim-0002; b=fxk4qMY0gd4NqlhhFHXjRz80dCOR6p6KGDXcSktoJ5m2FSmLRZuPun0nHWp4eEHOi8 ax3pr4dfwE2zvnoy7kzfIrmgTGsHHeTxkWELRVEILqHuz7u4sm7sTNcFnS2i/2eIGWmx Id1aJGDNnRN2hKBBrZZo4sI/fZud56toE1p9SIGuDOvdUbGLw44yX/Glcc44xKz9v4Ke gBBYZy7Rdq5BXhvs8iPaNXaTtMQualfVblpfWjIHCY8BAAWrbl35dAOpBiOOJQrTQwzH /6dRxA08HOSrxtdnfFfPnIEdIwqKKuGBYK/ByFuOYANIpKFJDWbBHgldeo17voCjhceI u8Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; t=1771821407; s=strato-dkim-0002; d=strato.com; h=Subject:Message-ID:To:From:Date:Cc:Date:From:Subject:Sender; bh=Bh2mmZoUCn/n8OIc4mPz14ADeEI/mSYuS6j6UfwZ9ss=; b=kqKNteFx6iDp1dVccwEWE9d+6b/myEeTfdtcNtvwejWa3oY6HICKP7Fy3drjVgYk5k CSrbVMLQGn/5DJoxlyZPlkiQAp/hBQWTjLXU/gzNor7F+AE0k+4/ISShtiIDVZat++2H B4Vl90fb8FK60qCJ5JoEHPVagz21RUSBUxRrovFMRklpZElTp9DKkDZCp0/7rnqcvbF7 URwXX6/7RNaaqTNFSWt8kJ01FMp8ZmrMHdla4Q0TvP/SpFoMoidL8X5xesTVMOsYnRjz DtrHI/YFucvKe8EU5Sk5wOgHH8Hn5ANYUKxkkkvTBu8wyHIdRr3vnGH4tLJTVUf/QmoX Z4Rw== ARC-Authentication-Results: i=1; strato.com; arc=none; dkim=none X-RZG-CLASS-ID: mo01 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1771821407; s=strato-dkim-0002; d=fpond.eu; h=Subject:Message-ID:To:From:Date:Cc:Date:From:Subject:Sender; bh=Bh2mmZoUCn/n8OIc4mPz14ADeEI/mSYuS6j6UfwZ9ss=; b=CqFhc7kA3wT+UTI417dW4XLqZH1P4oEgdhc7K5dxlH1HPE6Pcgvx6MWyanLnpH55m4 YpJkTHqoF3HHahjljbA8Kgr5lRLHD7lWy1lyeHUaV8+at5gR02wWlULRYN9riTBb7CEO LulAsEvBypSWwXaSr+XaKS/+dDO5xJu/xUynmbBJcevGKE4SKeiDE6/9PAIHN2qnS66G 07/oWOPWI4Vz5NiXdLy6+ipMnRsOwr0CBH8A6VF/i1CIrWDqXwhLmlj6qZo8ftGoR3Tv 0aBwnbe5hCEkkDCIlvLFwjiLO/FhSqX3iY2ZAc8W0eh3+bf3HLdogVS4j9dTcVGAm0ls miEA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; t=1771821407; s=strato-dkim-0003; d=fpond.eu; h=Subject:Message-ID:To:From:Date:Cc:Date:From:Subject:Sender; bh=Bh2mmZoUCn/n8OIc4mPz14ADeEI/mSYuS6j6UfwZ9ss=; b=Oprvm4VDzgkkoADuCeahqMAyWlSwHjb3y1dDghNjh/7W3UJs/uy4Ht5PTyx7o50BbP vSTY2KFnCuYl/lc9DtBQ== X-RZG-AUTH: ":OWANVUa4dPFUgKR/3dpvnYP0Np73amq+g13rqGzvtHhj3fsqaRxGvRq2JA==" Received: from open-xchange-core-mw-gw-34.open-xchange-core-mw-hazelcast-headless.open-xchange.svc.cluster.local by smtp-ox.front (RZmta 55.0.1 AUTH) with ESMTPSA id z92cbd21N4alIo6 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256 bits)) (Client did not present a certificate); Mon, 23 Feb 2026 05:36:47 +0100 (CET) Date: Mon, 23 Feb 2026 05:36:47 +0100 (CET) From: Ulrich Hecht To: "cip-dev@lists.cip-project.org" , "pavel@nabladev.com" , "jan.kiszka@siemens.com" , "masami.ichikawa@cybertrust.co.jp" , "chris.paterson2@renesas.com" , "nobuhiro.iwamatsu.x90@mail.toshiba" Message-ID: <1030360889.48837.1771821407401@webmail.strato.de> Subject: [ANNOUNCE] Release v4.19.325-cip129 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Normal X-Mailer: Open-Xchange Mailer v8.42.74 X-Originating-Port: 36966 X-Originating-Client: open-xchange-appsuite List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 23 Feb 2026 04:37:22 -0000 X-Groupsio-URL: https://lists.cip-project.org/g/cip-dev/message/21906 Hi, the CIP kernel team has released Linux kernel v4.19.325-cip129. The linux-4.19.y-cip tree's base version has been updated to v4.19-st13. The trees are up-to-date with kernel 5.10.250. You can get this release via the git tree or as a tarball from https://mirrors.edge.kernel.org/pub/linux/kernel/projects/cip/4.19/ v4.19.325-cip129: repository: https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git branch: linux-4.19.y-cip commit hash: b09f197499cfd4abeabbb8b072196af192931a60 Fixed CVEs: CVE-2022-3526: macvlan: Fix leaking skb in source mode with nodst option CVE-2023-54207: HID: uclogic: Correct devm device reference for hidinput input_dev name CVE-2023-54321: driver core: fix potential null-ptr-deref in device_add() CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time CVE-2025-71162: dmaengine: tegra-adma: Fix use-after-free CVE-2025-71185: dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation CVE-2025-71186: dmaengine: stm32: dmamux: fix device leak on route allocation CVE-2025-71188: dmaengine: lpc18xx-dmamux: fix device leak on route allocation CVE-2025-71190: dmaengine: bcm-sba-raid: fix device leak on probe CVE-2025-71191: dmaengine: at_hdmac: fix device leak on of_dma_xlate() CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type CVE-2025-71196: phy: stm32-usphyc: Fix off by one in probe() CVE-2025-71199: iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver CVE-2025-71222: wifi: wlcore: ensure skb headroom before skb_push CVE-2025-71224: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust CVE-2026-23033: dmaengine: omap-dma: fix dma_pool resource leak in error paths CVE-2026-23038: pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() CVE-2026-23058: can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec CVE-2026-23061: can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref CVE-2026-23071: regmap: Fix race condition in hwspinlock irqsave routine CVE-2026-23073: wifi: rsi: Fix memory corruption due to not set vif driver data size CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc CVE-2026-23075: can: esd_usb: esd_usb_read_bulk_callback(): fix URB memory leak CVE-2026-23076: ALSA: ctxfi: Fix potential OOB access in audio mixer handling CVE-2026-23080: can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list CVE-2026-23087: scsi: xen: scsiback: Fix potential memory leak in scsiback_remove() CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() CVE-2026-23090: slimbus: core: fix device reference leak on report present CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0. CVE-2026-23098: netrom: fix double-free in nr_route_frame() CVE-2026-23101: leds: led-class: Only Add LED to leds_list when it is fully ready CVE-2026-23103: ipvlan: Make the addrs_lock be per port CVE-2026-23108: can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() CVE-2026-23121: mISDN: annotate data-race around dev->work CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT CVE-2026-23133: wifi: ath10k: fix dma_free_coherent() pointer CVE-2026-23146: Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work CVE-2026-23164: rocker: fix memory leak in rocker_world_port_post_fini() CVE-2026-23167: nfc: nci: Fix race between rfkill and nci_unregister_device(). CVE-2026-23176: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() Best regards, Ulrich Hecht