lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170811220219.438083791@linuxfoundation.org>
Date:   Fri, 11 Aug 2017 15:02:14 -0700
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, stable@...r.kernel.org
Subject: [PATCH 4.4 00/15] 4.4.82-stable review

This is the start of the stable review cycle for the 4.4.82 release.
There are 15 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sun Aug 13 22:02:10 UTC 2017.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.82-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.82-rc1

Michal Kubeček <mkubecek@...e.cz>
    net: account for current skb length when deciding about UFO

zheng li <james.z.li@...csson.com>
    ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output

Matthew Dawson <matthew@...systems.ca>
    mm/mempool: avoid KASAN marking mempool poison checks as use-after-free

Suzuki K Poulose <Suzuki.Poulose@....com>
    KVM: arm/arm64: Handle hva aging while destroying the vm

Rob Gardner <rob.gardner@...cle.com>
    sparc64: Prevent perf from running during super critical sections

Willem de Bruijn <willemb@...gle.com>
    udp: consistently apply ufo or fragmentation

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    revert "ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output"

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    revert "net: account for current skb length when deciding about UFO"

Willem de Bruijn <willemb@...gle.com>
    packet: fix tp_reserve race in packet_set_ring

Willem de Bruijn <willemb@...gle.com>
    net: avoid skb_warn_bad_offload false positives on UFO

Eric Dumazet <edumazet@...gle.com>
    tcp: fastopen: tcp_connect() must refresh the route

Xin Long <lucien.xin@...il.com>
    net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target

Daniel Borkmann <daniel@...earbox.net>
    bpf, s390: fix jit branch offset related to ldimm64

Eric Dumazet <edumazet@...gle.com>
    net: fix keepalive code vs TCP_FASTOPEN_CONNECT

Yuchung Cheng <ycheng@...gle.com>
    tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states


-------------

Diffstat:

 Makefile                                |  4 ++--
 arch/arm/kvm/mmu.c                      |  4 ++++
 arch/s390/net/bpf_jit_comp.c            |  3 ++-
 arch/sparc/include/asm/mmu_context_64.h | 14 +++++++++-----
 arch/sparc/kernel/tsb.S                 | 12 ++++++++++++
 arch/sparc/power/hibernate.c            |  3 +--
 mm/mempool.c                            |  2 +-
 net/core/dev.c                          |  2 +-
 net/ipv4/ip_output.c                    |  8 +++++---
 net/ipv4/tcp_input.c                    |  4 ++--
 net/ipv4/tcp_output.c                   |  3 +++
 net/ipv4/tcp_timer.c                    |  3 ++-
 net/ipv4/udp.c                          |  2 +-
 net/ipv4/udp_offload.c                  |  2 +-
 net/ipv6/ip6_output.c                   |  7 ++++---
 net/ipv6/udp_offload.c                  |  2 +-
 net/packet/af_packet.c                  | 13 +++++++++----
 net/sched/act_ipt.c                     |  2 +-
 18 files changed, 61 insertions(+), 29 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ