lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170218154943.GA13719@kroah.com>
Date:   Sat, 18 Feb 2017 16:49:43 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc:     lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.4.50

I'm announcing the release of the 4.4.50 kernel.

All users of the 4.4 kernel series must upgrade.

The updated 4.4.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
	http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary

thanks,

greg k-h

------------

 Makefile                                   |    2 -
 drivers/net/ethernet/mellanox/mlx4/en_rx.c |    5 ++-
 drivers/net/loopback.c                     |    1 
 drivers/net/macvtap.c                      |    4 +-
 drivers/net/tun.c                          |   10 ++++---
 include/linux/can/core.h                   |    7 ++--
 include/linux/netdevice.h                  |    4 ++
 include/net/cipso_ipv4.h                   |    4 ++
 net/can/af_can.c                           |   12 +++++++-
 net/can/af_can.h                           |    3 +-
 net/can/bcm.c                              |    4 +-
 net/can/gw.c                               |    2 -
 net/can/raw.c                              |    4 +-
 net/core/dev.c                             |   31 +++++++++------------
 net/ethernet/eth.c                         |    1 
 net/ipv4/cipso_ipv4.c                      |    4 ++
 net/ipv4/ip_sockglue.c                     |    9 +++++-
 net/ipv4/ping.c                            |    2 +
 net/ipv4/tcp.c                             |    6 ++++
 net/ipv4/tcp_output.c                      |    6 ++--
 net/ipv6/ip6_gre.c                         |   41 +++++++++++++++--------------
 net/ipv6/ip6_tunnel.c                      |   34 +++++++++++++++---------
 net/ipv6/sit.c                             |    1 
 net/ipv6/tcp_ipv6.c                        |   24 +++++++++-------
 net/l2tp/l2tp_core.h                       |    1 
 net/l2tp/l2tp_ip.c                         |   27 ++++++++++++++++++-
 net/l2tp/l2tp_ip6.c                        |    2 -
 net/packet/af_packet.c                     |    7 ++--
 net/sctp/socket.c                          |    3 +-
 29 files changed, 172 insertions(+), 89 deletions(-)

Benjamin Poirier (1):
      mlx4: Invoke softirqs after napi_reschedule

Dan Carpenter (1):
      ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim()

Eric Dumazet (10):
      can: Fix kernel panic at security_sock_rcv_skb
      ipv6: fix ip6_tnl_parse_tlv_enc_lim()
      tcp: fix 0 divide in __tcp_select_window()
      net: use a work queue to defer net_disable_timestamp() work
      ipv4: keep skb->dst around in presence of IP options
      netlabel: out of bound access in cipso_v4_validate()
      ip6_gre: fix ip6gre_err() invalid reads
      ipv6: tcp: add a missing tcp_v6_restore_cb()
      tcp: avoid infinite loop in tcp_splice_read()
      l2tp: do not use udp_ioctl()

Greg Kroah-Hartman (1):
      Linux 4.4.50

Marcelo Ricardo Leitner (1):
      sctp: avoid BUG_ON on sctp_wait_for_sndbuf

WANG Cong (2):
      sit: fix a double free on error path
      ping: fix a null pointer dereference

Willem de Bruijn (4):
      tun: read vnet_hdr_sz once
      macvtap: read vnet_hdr_size once
      net: introduce device min_header_len
      packet: round up linear to header len


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ