public inbox for cip-dev@lists.cip-project.org
 help / color / mirror / Atom feed
From: Ulrich Hecht <uli@fpond.eu>
To: "cip-dev@lists.cip-project.org" <cip-dev@lists.cip-project.org>,
	"pavel@nabladev.com" <pavel@nabladev.com>,
	"jan.kiszka@siemens.com" <jan.kiszka@siemens.com>,
	"masami.ichikawa@cybertrust.co.jp"
	<masami.ichikawa@cybertrust.co.jp>,
	"chris.paterson2@renesas.com" <chris.paterson2@renesas.com>,
	"nobuhiro.iwamatsu.x90@mail.toshiba"
	<nobuhiro.iwamatsu.x90@mail.toshiba>
Subject: [ANNOUNCE] Release v4.19.325-cip128
Date: Thu, 29 Jan 2026 10:10:11 +0100 (CET)	[thread overview]
Message-ID: <886397605.315312.1769677811930@webmail.strato.de> (raw)

Hi,

the CIP kernel team has released Linux kernel v4.19.325-cip128. The linux-4.19.y-cip tree's base version has been updated to v4.19-st12. The trees are up-to-date with kernel 5.10.248.

You can get this release via the git tree or as a tarball from https://mirrors.edge.kernel.org/pub/linux/kernel/projects/cip/4.19/

  v4.19.325-cip128:
    repository:
      https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git
    branch:
      linux-4.19.y-cip
    commit hash:
      8665174e4bc9923fa55a22e1b4b3717e7b335404
    Fixed CVEs:
      CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()
      CVE-2023-52975: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress
      CVE-2024-36903: ipv6: Fix potential uninit-value access in __ip6_make_skb()
      CVE-2024-36927: ipv4: Fix uninit-value access in __ip_make_skb()
      CVE-2025-22121: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()
      CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits
      CVE-2025-40215: xfrm: delete x->tunnel as we delete x
      CVE-2025-40256: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added
      CVE-2025-68255: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing
      CVE-2025-68258: comedi: multiq3: sanitize config options in multiq3_attach()
      CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()
      CVE-2025-68264: ext4: refresh inline data size before write operations
      CVE-2025-68266: bfs: Reconstruct file type when loading from disk
      CVE-2025-68282: usb: gadget: udc: fix use-after-free in usb_gadget_state_work
      CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop
      CVE-2025-68332: comedi: c6xdigio: Fix invalid PNP driver unregistration
      CVE-2025-68336: locking/spinlock/debug: Fix data-race in do_raw_write_lock
      CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
      CVE-2025-68344: ALSA: wavefront: Fix integer overflow in sample size validation
      CVE-2025-68346: ALSA: dice: fix buffer overflow in detect_stream_formats()
      CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
      CVE-2025-68354: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex
      CVE-2025-68362: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
      CVE-2025-68364: ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
      CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect
      CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse
      CVE-2025-68372: nbd: defer config put in recv_work
      CVE-2025-68724: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
      CVE-2025-68733: smack: fix bug: unprivileged task can create labels
      CVE-2025-68757: drm/vgem-fence: Fix potential deadlock on release
      CVE-2025-68767: hfsplus: Verify inode mode when loading from disk
      CVE-2025-68769: f2fs: fix return value of f2fs_recover_fsync_data()
      CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
      CVE-2025-68773: spi: fsl-cpm: Check length parity before switching to 16 bit mode
      CVE-2025-68774: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create
      CVE-2025-68777: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation
      CVE-2025-68782: scsi: target: Reset t_task_cdb pointer in error case
      CVE-2025-68783: ALSA: usb-mixer: us16x08: validate meter packet indices
      CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action
      CVE-2025-68787: netrom: Fix memory leak in nr_sendmsg()
      CVE-2025-68789: hwmon: (ibmpex) fix use-after-free in high/low store
      CVE-2025-68796: f2fs: fix to avoid updating zero-sized extent in extent cache
      CVE-2025-68797: char: applicom: fix NULL pointer dereference in ac_ioctl
      CVE-2025-68799: caif: fix integer underflow in cffrml_receive()
      CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free
      CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
      CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
      CVE-2025-68819: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()
      CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode()
      CVE-2025-71069: f2fs: invalidate dentry cache on failed whiteout creation
      CVE-2025-71075: scsi: aic94xx: fix use-after-free in device removal path
      CVE-2025-71079: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
      CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
      CVE-2025-71086: net: rose: fix invalid array index in rose_kill_by_device()
      CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed()
      CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept()
      CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
      CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects
      CVE-2025-71098: ip6_gre: make ip6gre_header() robust
      CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
      CVE-2025-71108: usb: typec: ucsi: Handle incorrect num_connectors capability
      CVE-2025-71111: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU
      CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc
      CVE-2025-71114: via_wdt: fix critical boot hang due to unnamed resource allocation
      CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps
      CVE-2025-71118: ACPICA: Avoid walking the Namespace if start_node is NULL
      CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
      CVE-2025-71121: parisc: Do not reprogram affinitiy on ASP chip
      CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options()
      CVE-2025-71125: tracing: Do not register unsupported perf events
      CVE-2025-71127: wifi: mac80211: Discard Beacon frames to non-broadcast address
      CVE-2025-71131: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
      CVE-2025-71136: media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()
      CVE-2025-71146: netfilter: nf_conncount: fix leaked ct in error paths
      CVE-2025-71154: net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
      CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue
      CVE-2026-22978: wifi: avoid kernel-infoleak from struct iw_point
      CVE-2026-22988: arp: do not assume dev_hard_header() does not change skb->head
      CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental()
      CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation

Best regards,
Ulrich Hecht


                 reply	other threads:[~2026-01-29  9:10 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=886397605.315312.1769677811930@webmail.strato.de \
    --to=uli@fpond.eu \
    --cc=chris.paterson2@renesas.com \
    --cc=cip-dev@lists.cip-project.org \
    --cc=jan.kiszka@siemens.com \
    --cc=masami.ichikawa@cybertrust.co.jp \
    --cc=nobuhiro.iwamatsu.x90@mail.toshiba \
    --cc=pavel@nabladev.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox