lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170216175259.514980415@linuxfoundation.org>
Date:   Thu, 16 Feb 2017 09:53:30 -0800
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, stable@...r.kernel.org
Subject: [PATCH 4.4 00/20] 4.4.50-stable review

This is the start of the stable review cycle for the 4.4.50 release.
There are 20 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sat Feb 18 17:52:49 UTC 2017.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.50-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.50-rc1

Pau Espin Pedrol <pespin.shar@...il.com>
    tcp: fix mark propagation with fwmark_reflect enabled

Eric Dumazet <edumazet@...gle.com>
    l2tp: do not use udp_ioctl()

WANG Cong <xiyou.wangcong@...il.com>
    ping: fix a null pointer dereference

Willem de Bruijn <willemb@...gle.com>
    packet: round up linear to header len

Willem de Bruijn <willemb@...gle.com>
    net: introduce device min_header_len

WANG Cong <xiyou.wangcong@...il.com>
    sit: fix a double free on error path

Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
    sctp: avoid BUG_ON on sctp_wait_for_sndbuf

Benjamin Poirier <bpoirier@...e.com>
    mlx4: Invoke softirqs after napi_reschedule

Willem de Bruijn <willemb@...gle.com>
    macvtap: read vnet_hdr_size once

Willem de Bruijn <willemb@...gle.com>
    tun: read vnet_hdr_sz once

Eric Dumazet <edumazet@...gle.com>
    tcp: avoid infinite loop in tcp_splice_read()

Eric Dumazet <edumazet@...gle.com>
    ipv6: tcp: add a missing tcp_v6_restore_cb()

Eric Dumazet <edumazet@...gle.com>
    ip6_gre: fix ip6gre_err() invalid reads

Eric Dumazet <edumazet@...gle.com>
    netlabel: out of bound access in cipso_v4_validate()

Eric Dumazet <edumazet@...gle.com>
    ipv4: keep skb->dst around in presence of IP options

Eric Dumazet <edumazet@...gle.com>
    net: use a work queue to defer net_disable_timestamp() work

Eric Dumazet <edumazet@...gle.com>
    tcp: fix 0 divide in __tcp_select_window()

Dan Carpenter <dan.carpenter@...cle.com>
    ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim()

Eric Dumazet <edumazet@...gle.com>
    ipv6: fix ip6_tnl_parse_tlv_enc_lim()

Eric Dumazet <edumazet@...gle.com>
    can: Fix kernel panic at security_sock_rcv_skb


-------------

Diffstat:

 Makefile                                   |  4 +--
 drivers/net/ethernet/mellanox/mlx4/en_rx.c |  5 +++-
 drivers/net/loopback.c                     |  1 +
 drivers/net/macvtap.c                      |  4 +--
 drivers/net/tun.c                          | 10 +++++---
 include/linux/can/core.h                   |  7 +++--
 include/linux/netdevice.h                  |  4 +++
 include/net/cipso_ipv4.h                   |  4 +++
 net/can/af_can.c                           | 12 +++++++--
 net/can/af_can.h                           |  3 ++-
 net/can/bcm.c                              |  4 +--
 net/can/gw.c                               |  2 +-
 net/can/raw.c                              |  4 +--
 net/core/dev.c                             | 31 ++++++++++------------
 net/ethernet/eth.c                         |  1 +
 net/ipv4/cipso_ipv4.c                      |  4 +++
 net/ipv4/ip_output.c                       |  1 +
 net/ipv4/ip_sockglue.c                     |  9 ++++++-
 net/ipv4/ping.c                            |  2 ++
 net/ipv4/tcp.c                             |  6 +++++
 net/ipv4/tcp_output.c                      |  6 +++--
 net/ipv6/ip6_gre.c                         | 41 ++++++++++++++++--------------
 net/ipv6/ip6_tunnel.c                      | 34 ++++++++++++++++---------
 net/ipv6/sit.c                             |  1 +
 net/ipv6/tcp_ipv6.c                        | 25 ++++++++++--------
 net/l2tp/l2tp_core.h                       |  1 +
 net/l2tp/l2tp_ip.c                         | 27 +++++++++++++++++++-
 net/l2tp/l2tp_ip6.c                        |  2 +-
 net/packet/af_packet.c                     |  7 ++---
 net/sctp/socket.c                          |  3 ++-
 30 files changed, 175 insertions(+), 90 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ