lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171122101110.784746358@linuxfoundation.org>
Date:   Wed, 22 Nov 2017 11:11:53 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
        stable@...r.kernel.org
Subject: [PATCH 4.4 00/16] 4.4.101-stable review

This is the start of the stable review cycle for the 4.4.101 release.
There are 16 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Fri Nov 24 10:11:01 UTC 2017.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.101-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.101-rc1

Jan Harkes <jaharkes@...cmu.edu>
    coda: fix 'kernel memory exposure attempt' in fsync

Pavel Tatashin <pasha.tatashin@...cle.com>
    mm/page_alloc.c: broken deferred calculation

Corey Minyard <cminyard@...sta.com>
    ipmi: fix unsigned long underflow

alex chen <alex.chen@...wei.com>
    ocfs2: should wait dio before inode lock in ocfs2_setattr()

Keith Busch <keith.busch@...el.com>
    nvme: Fix memory order on async queue deletion

Mark Rutland <mark.rutland@....com>
    arm64: fix dump_instr when PAN and UAO are in use

Lukas Wunner <lukas@...ner.de>
    serial: omap: Fix EFR write on RTS deassertion

Roberto Sassu <roberto.sassu@...wei.com>
    ima: do not update security.ima if appraisal status is not INTEGRITY_PASS

Eric W. Biederman <ebiederm@...ssion.com>
    net/sctp: Always set scope_id in sctp_inet6_skb_msgname

Huacai Chen <chenhc@...ote.com>
    fealnx: Fix building error on MIPS

Xin Long <lucien.xin@...il.com>
    sctp: do not peel off an assoc from one netns to another one

Jason A. Donenfeld <Jason@...c4.com>
    af_netlink: ensure that NLMSG_DONE never fails in dumps

Cong Wang <xiyou.wangcong@...il.com>
    vlan: fix a use-after-free in vlan_device_event()

Hangbin Liu <liuhangbin@...il.com>
    bonding: discard lowest hash bit for 802.3ad layer3+4

Ye Yin <hustcat@...il.com>
    netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed

Eric Dumazet <edumazet@...gle.com>
    tcp: do not mangle skb->cb[] in tcp_make_synack()


-------------

Diffstat:

 Makefile                              |  4 ++--
 arch/arm64/kernel/traps.c             | 26 +++++++++++++-------------
 drivers/char/ipmi/ipmi_msghandler.c   | 10 ++++++----
 drivers/net/bonding/bond_main.c       |  2 +-
 drivers/net/ethernet/fealnx.c         |  6 +++---
 drivers/nvme/host/pci.c               |  2 +-
 drivers/tty/serial/omap-serial.c      |  2 +-
 fs/coda/upcall.c                      |  3 +--
 fs/ocfs2/file.c                       |  9 +++++++--
 include/linux/mmzone.h                |  3 ++-
 include/linux/skbuff.h                |  7 +++++++
 mm/page_alloc.c                       | 27 ++++++++++++++++++---------
 net/8021q/vlan.c                      |  6 +++---
 net/core/skbuff.c                     |  1 +
 net/ipv4/tcp_output.c                 |  9 ++-------
 net/netlink/af_netlink.c              | 17 +++++++++++------
 net/netlink/af_netlink.h              |  1 +
 net/sctp/ipv6.c                       |  2 ++
 net/sctp/socket.c                     |  4 ++++
 security/integrity/ima/ima_appraise.c |  3 +++
 20 files changed, 89 insertions(+), 55 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ