lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171119144311.441716251@linuxfoundation.org>
Date:   Sun, 19 Nov 2017 15:43:47 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, stable@...r.kernel.org
Subject: [PATCH 4.13 00/28] 4.13.15-stable review

This is the start of the stable review cycle for the 4.13.15 release.
There are 28 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Tue Nov 21 14:42:57 UTC 2017.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.13.15-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.13.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.13.15-rc1

Hans de Goede <hdegoede@...hat.com>
    staging: rtl8188eu: Revert 4 commits breaking ARP

Hans de Goede <hdegoede@...hat.com>
    staging: vboxvideo: Fix reporting invalid suggested-offset-properties

Johan Hovold <johan@...nel.org>
    staging: greybus: spilib: fix use-after-free after deregistration

Gilad Ben-Yossef <gilad@...yossef.com>
    staging: ccree: fix 64 bit scatter/gather DMA ops

Huacai Chen <chenhc@...ote.com>
    staging: sm750fb: Fix parameter mistake in poke32

Aditya Shankar <aditya.shankar@...rochip.com>
    staging: wilc1000: Fix bssid buffer offset in Txq

Jason Gerecke <killertofu@...il.com>
    HID: wacom: generic: Recognize WACOM_HID_WD_PEN as a type of pen collection

Sébastien Szymanski <sebastien.szymanski@...adeus.com>
    HID: cp2112: add HIDRAW dependency

Hans de Goede <hdegoede@...hat.com>
    platform/x86: peaq_wmi: Fix missing terminating entry for peaq_dmi_table

Hans de Goede <hdegoede@...hat.com>
    platform/x86: peaq-wmi: Add DMI check before binding to the WMI interface

Yazen Ghannam <yazen.ghannam@....com>
    x86/MCE/AMD: Always give panic severity for UC errors in kernel context

Andy Lutomirski <luto@...nel.org>
    selftests/x86/protection_keys: Fix syscall NR redefinition warnings

Johan Hovold <johan@...nel.org>
    USB: serial: garmin_gps: fix memory leak on probe errors

Johan Hovold <johan@...nel.org>
    USB: serial: garmin_gps: fix I/O after failed probe and remove

Douglas Fischer <douglas.fischer@...look.com>
    USB: serial: qcserial: add pid/vid for Sierra Wireless EM7355 fw update

Lu Baolu <baolu.lu@...ux.intel.com>
    USB: serial: Change DbC debug device binding ID

Johan Hovold <johan@...nel.org>
    USB: serial: metro-usb: stop I/O after failed open

Andrew Gabbasov <andrew_gabbasov@...tor.com>
    usb: gadget: f_fs: Fix use-after-free in ffs_free_inst

Bernhard Rosenkraenzer <bernhard.rosenkranzer@...aro.org>
    USB: Add delay-init quirk for Corsair K70 LUX keyboards

Alan Stern <stern@...land.harvard.edu>
    USB: usbfs: compute urb->actual_length for isochronous

Lu Baolu <baolu.lu@...ux.intel.com>
    USB: early: Use new USB product ID and strings for DbC device

raveendra padasalagi <raveendra.padasalagi@...adcom.com>
    crypto: brcm - Explicity ACK mailbox message

Eric Biggers <ebiggers@...gle.com>
    crypto: dh - Don't permit 'key' or 'g' size longer than 'p'

Eric Biggers <ebiggers@...gle.com>
    crypto: dh - Don't permit 'p' to be 0

Eric Biggers <ebiggers@...gle.com>
    crypto: dh - Fix double free of ctx->p

Leif Liddy <leif.linux@...il.com>
    Bluetooth: btusb: fix QCA Rome suspend/resume

Andrey Konovalov <andreyknvl@...gle.com>
    media: dib0700: fix invalid dvb_detach argument

Arvind Yadav <arvind.yadav.cs@...il.com>
    media: imon: Fix null-ptr-deref in imon_probe


-------------

Diffstat:

 Makefile                                      |   4 +-
 arch/x86/kernel/cpu/mcheck/mce-severity.c     |   7 +-
 crypto/dh.c                                   |  33 ++++-----
 crypto/dh_helper.c                            |  16 ++++
 drivers/bluetooth/btusb.c                     |   6 ++
 drivers/crypto/bcm/cipher.c                   | 101 ++++++++++++--------------
 drivers/hid/Kconfig                           |   2 +-
 drivers/hid/wacom_wac.h                       |   1 +
 drivers/media/rc/imon.c                       |   5 ++
 drivers/media/usb/dvb-usb/dib0700_devices.c   |  24 +++---
 drivers/platform/x86/peaq-wmi.c               |  19 +++++
 drivers/staging/ccree/cc_lli_defs.h           |   2 +-
 drivers/staging/greybus/spilib.c              |   8 +-
 drivers/staging/rtl8188eu/core/rtw_recv.c     |  83 ++++++++++++---------
 drivers/staging/rtl8188eu/os_dep/mon.c        |  34 ++-------
 drivers/staging/sm750fb/ddk750_chip.h         |   2 +-
 drivers/staging/vboxvideo/vbox_drv.h          |   8 +-
 drivers/staging/vboxvideo/vbox_irq.c          |   4 +-
 drivers/staging/vboxvideo/vbox_mode.c         |  26 +++++--
 drivers/staging/wilc1000/wilc_wlan.c          |   2 +-
 drivers/usb/core/devio.c                      |  14 ++++
 drivers/usb/core/quirks.c                     |   3 +
 drivers/usb/early/xhci-dbc.h                  |   6 +-
 drivers/usb/gadget/function/f_fs.c            |   1 +
 drivers/usb/serial/garmin_gps.c               |  22 +++++-
 drivers/usb/serial/metro-usb.c                |  11 ++-
 drivers/usb/serial/qcserial.c                 |   1 +
 drivers/usb/serial/usb_debug.c                |   4 +-
 tools/testing/selftests/x86/protection_keys.c |  24 ++++--
 29 files changed, 280 insertions(+), 193 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ