Show patches with: Submitter = Greg Kroah-Hartman       |    State = Action Required       |   113 patches
« 1 2 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[5.2,22/61] Documentation/admin: Remove the vsyscall=native documentation Untitled series #145345 1 - - --- 2019-07-12 Greg Kroah-Hartman New
[5.1,105/138] Documentation/admin: Remove the vsyscall=native documentation Untitled series #145341 1 - - --- 2019-07-12 Greg Kroah-Hartman New
[4.19,66/91] Documentation/admin: Remove the vsyscall=native documentation Untitled series #145337 1 - - --- 2019-07-12 Greg Kroah-Hartman New
[5.1,85/85] x86/kprobes: Set instruction page as executable Untitled series #128861 - - - --- 2019-06-07 Greg Kroah-Hartman New
[4.19,69/73] x86/kprobes: Set instruction page as executable Untitled series #128857 - - - --- 2019-06-07 Greg Kroah-Hartman New
[4.19,68/73] x86/ftrace: Set trampoline pages as executable Untitled series #128857 - 1 - --- 2019-06-07 Greg Kroah-Hartman New
[4.19,079/276] x86/modules: Avoid breaking W^X while loading modules Untitled series #124875 - - - --- 2019-05-30 Greg Kroah-Hartman New
[5.0,086/346] x86/modules: Avoid breaking W^X while loading modules Untitled series #124865 - - - --- 2019-05-30 Greg Kroah-Hartman New
[5.0,079/346] x86/ftrace: Set trampoline pages as executable Untitled series #124865 - 1 - --- 2019-05-30 Greg Kroah-Hartman New
[5.1,095/405] x86/modules: Avoid breaking W^X while loading modules Untitled series #124849 - - - --- 2019-05-30 Greg Kroah-Hartman New
[5.1,088/405] x86/ftrace: Set trampoline pages as executable Untitled series #124849 - 1 - --- 2019-05-30 Greg Kroah-Hartman New
tty: ldisc: add sysctl to prevent autoloading of ldiscs tty: ldisc: add sysctl to prevent autoloading of ldiscs - 1 - --- 2019-01-21 Greg Kroah-Hartman New
[3.18,012/185] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl - - - --- 2018-05-28 Greg Kroah-Hartman New
[4.4,022/268] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl - - - --- 2018-05-28 Greg Kroah-Hartman New
[4.9,029/329] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl - - - --- 2018-05-28 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 3.18-stable tree - - - --- 2018-05-28 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 4.4-stable tree - - - --- 2018-05-27 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 4.9-stable tree - - - --- 2018-05-27 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 3.18-stable tree - - - --- 2018-05-02 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 4.4-stable tree - - - --- 2018-05-02 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 4.9-stable tree - - - --- 2018-05-02 Greg Kroah-Hartman New
[4.14,022/183] kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl - - - --- 2018-04-25 Greg Kroah-Hartman New
Patch "kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl" has been added to the 4.14-stable tree - - - --- 2018-04-24 Greg Kroah-Hartman New
[4.4,11/36] x86/syscall: Sanitize syscall table de-references under speculation fix - - - --- 2018-03-10 Greg Kroah-Hartman New
[4.4,181/193] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,180/193] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,179/193] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,178/193] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,177/193] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,176/193] x86: Introduce barrier_nospec - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,175/193] x86: Implement array_index_mask_nospec - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,174/193] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-23 Greg Kroah-Hartman New
[4.4,173/193] Documentation: Document array_index_nospec - 1 - --- 2018-02-23 Greg Kroah-Hartman New
[4.9,67/92] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,66/92] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,65/92] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,64/92] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,63/92] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,62/92] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,61/92] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,60/92] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,59/92] x86: Introduce barrier_nospec - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,58/92] x86: Implement array_index_mask_nospec - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,57/92] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,56/92] Documentation: Document array_index_nospec - 1 - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,55/92] x86/asm: Move status from thread_struct to thread_info 1 1 - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,54/92] x86/entry/64: Push extra regs right away 1 - - --- 2018-02-09 Greg Kroah-Hartman New
[4.9,53/92] x86/entry/64: Remove the SYSCALL64 fast path 1 - - --- 2018-02-09 Greg Kroah-Hartman New
Patch "x86/entry/64: Push extra regs right away" has been added to the 4.9-stable tree 1 - - --- 2018-02-08 Greg Kroah-Hartman New
Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.9-stable tree 1 - - --- 2018-02-08 Greg Kroah-Hartman New
Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.9-stable t… 1 1 - --- 2018-02-08 Greg Kroah-Hartman New
[4.15,43/60] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,42/60] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,41/60] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,40/60] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,39/60] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,38/60] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,37/60] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,36/60] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,35/60] x86: Introduce barrier_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,34/60] x86: Implement array_index_mask_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,33/60] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,47/64] x86/spectre: Report get_user mitigation for spectre_v1 - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,32/60] Documentation: Document array_index_nospec - 1 - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,46/64] nl80211: Sanitize array index in parse_txq_params 1 - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,31/60] x86/asm: Move status from thread_struct to thread_info 1 1 - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,45/64] vfs, fdtable: Prevent bounds-check bypass via speculative execution - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,30/60] x86/entry/64: Push extra regs right away 1 - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,44/64] x86/syscall: Sanitize syscall table de-references under speculation - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.15,29/60] x86/entry/64: Remove the SYSCALL64 fast path 1 - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,43/64] x86/get_user: Use pointer masking to limit speculation - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,42/64] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,41/64] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,40/64] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,39/64] x86: Introduce barrier_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,38/64] x86: Implement array_index_mask_nospec - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,37/64] array_index_nospec: Sanitize speculative array de-references - - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,36/64] Documentation: Document array_index_nospec - 1 - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,35/64] x86/asm: Move status from thread_struct to thread_info 1 1 - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,34/64] x86/entry/64: Push extra regs right away 1 - - --- 2018-02-05 Greg Kroah-Hartman New
[4.14,33/64] x86/entry/64: Remove the SYSCALL64 fast path 1 - - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/entry/64: Push extra regs right away" has been added to the 4.15-stable tree 1 - - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.15-stable tree 1 - - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.15-stable … 1 1 - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/entry/64: Push extra regs right away" has been added to the 4.14-stable tree 1 - - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/entry/64: Remove the SYSCALL64 fast path" has been added to the 4.14-stable tree 1 - - --- 2018-02-05 Greg Kroah-Hartman New
Patch "x86/asm: Move 'status' from thread_struct to thread_info" has been added to the 4.14-stable … 1 1 - --- 2018-02-05 Greg Kroah-Hartman New
[4.9,04/39] KAISER: Kernel Address Isolation 1 - - --- 2018-01-03 Greg Kroah-Hartman New
[4.4,02/37] KAISER: Kernel Address Isolation 1 - - --- 2018-01-03 Greg Kroah-Hartman New
[4.13,106/110] x86/fpu: Dont let userspace set bogus xcomp_bv 1 2 - --- 2017-10-03 Greg Kroah-Hartman New
[4.9,56/64] x86/fpu: Dont let userspace set bogus xcomp_bv 1 2 - --- 2017-10-03 Greg Kroah-Hartman New
[4.4,30/41] x86/fpu: Dont let userspace set bogus xcomp_bv 1 2 - --- 2017-10-03 Greg Kroah-Hartman New
[3.18,22/24] x86/fpu: Dont let userspace set bogus xcomp_bv 1 2 - --- 2017-10-03 Greg Kroah-Hartman New
[3.18,26/45] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bi… 3 - - --- 2017-06-12 Greg Kroah-Hartman New
[4.4,47/90] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bit… 3 - - --- 2017-06-12 Greg Kroah-Hartman New
[3.18,01/33] Revert "stackprotector: Increase the per-task stack canarys random range from 32 bits … - - - --- 2017-06-05 Greg Kroah-Hartman New
[3.18,52/59] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 bi… 3 - - --- 2017-05-23 Greg Kroah-Hartman New
[4.4,094/103] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 b… 3 - - --- 2017-05-23 Greg Kroah-Hartman New
[4.9,140/164] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 b… 3 - - --- 2017-05-23 Greg Kroah-Hartman New
[4.11,161/197] stackprotector: Increase the per-task stack canarys random range from 32 bits to 64 … 3 - - --- 2017-05-23 Greg Kroah-Hartman New
« 1 2 »