[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170322130536.GA24952@kroah.com>
Date: Wed, 22 Mar 2017 14:05:36 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>,
torvalds@...ux-foundation.org, stable@...r.kernel.org
Cc: lwn@....net, Jiri Slaby <jslaby@...e.cz>
Subject: Linux 4.4.56
I'm announcing the release of the 4.4.56 kernel.
All users of the 4.4 kernel series must upgrade.
The updated 4.4.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Documentation/networking/netlink_mmap.txt | 332 -------------
Makefile | 2
arch/x86/kernel/cpu/perf_event.c | 4
arch/x86/kernel/head64.c | 1
arch/x86/mm/kasan_init_64.c | 1
drivers/net/vrf.c | 3
drivers/net/vxlan.c | 2
fs/ext4/crypto_policy.c | 6
fs/ext4/ioctl.c | 4
fs/f2fs/crypto_policy.c | 5
fs/f2fs/file.c | 9
include/linux/dccp.h | 1
include/uapi/linux/netlink.h | 4
include/uapi/linux/netlink_diag.h | 2
include/uapi/linux/packet_diag.h | 2
kernel/futex.c | 22
net/bridge/br_input.c | 1
net/bridge/br_netfilter_hooks.c | 21
net/core/dev.c | 35 +
net/core/skbuff.c | 30 -
net/dccp/ccids/ccid2.c | 1
net/dccp/ipv4.c | 3
net/dccp/ipv6.c | 8
net/dccp/minisocks.c | 25
net/ipv4/route.c | 1
net/ipv4/tcp_ipv4.c | 10
net/ipv4/tcp_timer.c | 6
net/ipv6/ip6_fib.c | 2
net/ipv6/ip6_output.c | 7
net/ipv6/ip6_vti.c | 4
net/ipv6/tcp_ipv6.c | 8
net/l2tp/l2tp_ip.c | 2
net/mpls/af_mpls.c | 1
net/netlink/Kconfig | 9
net/netlink/af_netlink.c | 751 ------------------------------
net/netlink/af_netlink.h | 15
net/netlink/diag.c | 39 -
net/packet/af_packet.c | 8
net/sched/act_api.c | 5
net/sched/act_connmark.c | 3
40 files changed, 174 insertions(+), 1221 deletions(-)
Alexander Potapenko (1):
net: don't call strlen() on the user buffer in packet_bind_spkt()
Andrey Ryabinin (1):
x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
Andy Lutomirski (1):
x86/perf: Fix CR4.PCE propagation to use active_mm instead of mm
Arnaldo Carvalho de Melo (1):
dccp: Unlock sock before calling sk_free()
David Ahern (2):
vrf: Fix use-after-free in vrf_xmit
mpls: Send route delete notifications when router module is unloaded
David Forster (1):
vti6: return GRE_KEY for vti6
Dmitry V. Levin (1):
uapi: fix linux/packet_diag.h userspace compilation error
Eric Biggers (2):
fscrypt: fix renaming and linking special files
fscrypto: lock inode while setting encryption policy
Eric Dumazet (5):
net: net_enable_timestamp() can be called from irq contexts
tcp: fix various issues for sockets morphing to listen state
net: fix socket refcounting in skb_complete_wifi_ack()
net: fix socket refcounting in skb_complete_tx_timestamp()
dccp: fix use-after-free in dccp_feat_activate_values
Etienne Noss (1):
act_connmark: avoid crashing on malformed nlattrs with null parms
Florian Westphal (3):
netlink: remove mmapped netlink support
ipv6: avoid write to a possibly cloned skb
bridge: drop netfilter fake rtable unconditionally
Greg Kroah-Hartman (1):
Linux 4.4.56
Hannes Frederic Sowa (1):
dccp: fix memory leak during tear-down of unsuccessful connection request
Jon Maxwell (1):
dccp/tcp: fix routing redirect race
Julian Anastasov (1):
ipv4: mask tos for input route
Matthias Schiffer (1):
vxlan: correctly validate VXLAN ID against VXLAN_N_VID
Paul Hüber (1):
l2tp: avoid use-after-free caused by l2tp_ip_backlog_recv
Peter Zijlstra (2):
futex: Fix potential use-after-free in FUTEX_REQUEUE_PI
futex: Add missing error handling to FUTEX_REQUEUE_PI
Roman Mashak (1):
net sched actions: decrement module reference count after table flush.
Sabrina Dubroca (1):
ipv6: make ECMP route replacement less greedy
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)
Powered by blists - more mailing lists