public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <gregkh@suse.de>
To: linux-kernel@vger.kernel.org,
	Andrew Morton <akpm@linux-foundation.org>,
	torvalds@linux-foundation.org, stable@kernel.org
Cc: lwn@lwn.net
Subject: Linux 2.6.27.37
Date: Mon, 12 Oct 2009 16:15:54 -0700	[thread overview]
Message-ID: <20091012231554.GC23794@kroah.com> (raw)

I'm announcing the release of the 2.6.27.37 kernel.  All users of the
2.6.27 kernel series are very strongly encouraged to upgrade.

I'll also be replying to this message with a copy of the patch between
2.6.27.35 and 2.6.27.36

The updated 2.6.27.y git tree can be found at:
        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.27.y.git
and can be browsed at the normal kernel.org git web browser:
        http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=summary

thanks,

greg k-h

------------

 Makefile                   |    2 -
 arch/x86/ia32/ia32entry.S  |   56 ++++++++++++++++++++++++---------------------
 arch/x86/kvm/x86.c         |    6 ++++
 arch/x86/mm/mmap.c         |   17 ++++++++++++-
 drivers/net/iseries_veth.c |    2 -
 drivers/watchdog/hpwdt.c   |   15 +++++-------
 fs/ecryptfs/inode.c        |    2 +
 include/asm-x86/elf.h      |    2 +
 include/linux/kvm_para.h   |    1 
 kernel/time/timekeeping.c  |   22 +++++++++++++++++
 10 files changed, 87 insertions(+), 38 deletions(-)

Greg Kroah-Hartman (1):
      Linux 2.6.27.37

Jan Beulich (2):
      x86-64: slightly stream-line 32-bit syscall entry code
      x86: Don't leak 64-bit kernel register values to 32-bit processes

Jan Kiszka (1):
      KVM: x86: Disallow hypercalls for guest callers in rings > 0 [CVE-2009-3290]

Jean Delvare (1):
      net: Fix wrong sizeof

John Stultz (1):
      time: catch xtime_nsec underflows and fix them

Michal Hocko (1):
      x86: Increase MIN_GAP to include randomized stack

Thomas Mingarelli (1):
      hpwdt.c: Add new HP BMC controller.

Tyler Hicks (1):
      eCryptfs: Prevent lower dentry from going negative during unlink (CVE-2009-2908)


             reply	other threads:[~2009-10-12 23:19 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-10-12 23:15 Greg KH [this message]
2009-10-12 23:16 ` Linux 2.6.27.37 Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20091012231554.GC23794@kroah.com \
    --to=gregkh@suse.de \
    --cc=akpm@linux-foundation.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lwn@lwn.net \
    --cc=stable@kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox