lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20161021091413.053290730@linuxfoundation.org>
Date:   Fri, 21 Oct 2016 11:15:51 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuah.kh@...sung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, stable@...r.kernel.org
Subject: [PATCH 4.4 00/25] 4.4.27-stable review

This is the start of the stable review cycle for the 4.4.27 release.
There are 25 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sun Oct 23 09:13:58 UTC 2016.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.27-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.27-rc1

Glauber Costa <glauber@...lladb.com>
    cfq: fix starvation of asynchronous writes

Miklos Szeredi <mszeredi@...hat.com>
    vfs: move permission checking into notify_change() for utimes(NULL)

Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
    dlm: free workqueues after the connections

Marcelo Cerri <marcelo.cerri@...onical.com>
    crypto: vmx - Fix memory corruption caused by p8_ghash

Marcelo Cerri <marcelo.cerri@...onical.com>
    crypto: ghash-generic - move common definitions to a new header file

gmail <yngsion@...il.com>
    ext4: release bh in make_indexed_dir

Ross Zwisler <ross.zwisler@...ux.intel.com>
    ext4: allow DAX writeback for hole punch

Fabian Frederick <fabf@...net.be>
    ext4: fix memory leak in ext4_insert_range()

Daeho Jeong <daeho.jeong@...sung.com>
    ext4: reinforce check of i_dtime when clearing high fields of uid and gid

Eric Whitney <enwlinux@...il.com>
    ext4: enforce online defrag restriction for encrypted files

Brian King <brking@...ux.vnet.ibm.com>
    scsi: ibmvfc: Fix I/O hang when port is not mapped

Borislav Petkov <bp@...en8.de>
    scsi: arcmsr: Simplify user_len checking

Dan Carpenter <dan.carpenter@...cle.com>
    scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()

Justin Maggard <jmaggard10@...il.com>
    async_pq_val: fix DMA memory leak

Al Viro <viro@...iv.linux.org.uk>
    reiserfs: switch to generic_{get,set,remove}xattr()

Mike Galbraith <efault@....de>
    reiserfs: Unlock superblock before calling reiserfs_quota_on_mount()

Nicolas Iooss <nicolas.iooss_linux@....org>
    ASoC: Intel: Atom: add a missing star in a memcpy call

Rafał Miłecki <rafal@...ecki.pl>
    brcmfmac: fix memory leak in brcmf_fill_bss_param

Guilherme G Piccoli <gpiccoli@...ux.vnet.ibm.com>
    i40e: avoid NULL pointer dereference and recursive errors on early PCI error

Miklos Szeredi <mszeredi@...hat.com>
    fuse: fix killing s[ug]id in setattr

Miklos Szeredi <mszeredi@...hat.com>
    fuse: invalidate dir dentry after chmod

Miklos Szeredi <mszeredi@...hat.com>
    fuse: listxattr: verify xattr list

Peng Fan <van.freenix@...il.com>
    drivers: base: dma-mapping: page align the size when unmap_kernel_range

Junjie Mao <junjie.mao@...ght.me>
    btrfs: assign error values to the correct bio structs

Kefeng Wang <wangkefeng.wang@...wei.com>
    serial: 8250_dw: Check the data->pclk when get apb_pclk


-------------

Diffstat:

 Makefile                                           |  4 +-
 block/cfq-iosched.c                                | 13 +++--
 crypto/async_tx/async_pq.c                         |  8 +--
 crypto/ghash-generic.c                             | 13 +----
 drivers/base/dma-mapping.c                         |  2 +-
 drivers/crypto/vmx/ghash.c                         | 31 ++++++------
 drivers/net/ethernet/intel/i40e/i40e_main.c        |  6 +++
 drivers/net/wireless/brcm80211/brcmfmac/cfg80211.c |  5 +-
 drivers/scsi/arcmsr/arcmsr_hba.c                   | 12 ++++-
 drivers/scsi/ibmvscsi/ibmvfc.c                     |  1 -
 drivers/tty/serial/8250/8250_dw.c                  |  2 +-
 fs/attr.c                                          | 15 ++++++
 fs/btrfs/compression.c                             |  4 +-
 fs/dlm/lowcomms.c                                  |  8 +--
 fs/ext4/extents.c                                  |  3 ++
 fs/ext4/inode.c                                    | 12 ++---
 fs/ext4/move_extent.c                              |  7 +++
 fs/ext4/namei.c                                    | 14 +++--
 fs/fuse/dir.c                                      | 59 ++++++++++++++++++++--
 fs/reiserfs/file.c                                 |  6 +--
 fs/reiserfs/namei.c                                | 18 +++----
 fs/reiserfs/super.c                                | 12 ++++-
 fs/reiserfs/xattr.c                                | 54 --------------------
 fs/reiserfs/xattr.h                                |  9 +---
 fs/reiserfs/xattr_security.c                       | 14 +++--
 fs/reiserfs/xattr_trusted.c                        | 14 +++--
 fs/reiserfs/xattr_user.c                           | 14 +++--
 fs/utimes.c                                        | 16 +-----
 include/crypto/ghash.h                             | 23 +++++++++
 include/linux/fs.h                                 |  1 +
 sound/soc/intel/atom/sst/sst_pvt.c                 | 14 +++--
 31 files changed, 224 insertions(+), 190 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ