lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20180108125925.601688333@linuxfoundation.org>
Date:   Mon,  8 Jan 2018 13:59:27 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuahkh@....samsung.com, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
        stable@...r.kernel.org
Subject: [PATCH 4.4 00/22] 4.4.111-stable review

This is the start of the stable review cycle for the 4.4.111 release.
There are 22 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Jan 10 12:59:14 UTC 2018.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.111-rc1.gz
or in the git tree and branch at:
  git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.111-rc1

Borislav Petkov <bp@...e.de>
    Map the vsyscall page with _PAGE_USER

Alexey Dobriyan <adobriyan@...il.com>
    proc: much faster /proc/vmstat

Libor Pechacek <lpechacek@...e.com>
    module: Issue warnings when tainting kernel

Miroslav Benes <mbenes@...e.cz>
    module: keep percpu symbols in module's symtab

Michal Marek <mmarek@...e.com>
    genksyms: Handle string literals with spaces in reference files

Thomas Gleixner <tglx@...utronix.de>
    x86/tlb: Drop the _GPL from the cpu_tlbstate export

Boris Brezillon <boris.brezillon@...e-electrons.com>
    mtd: nand: pxa3xx: Fix READOOB implementation

Helge Deller <deller@....de>
    parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel

Tom Lendacky <thomas.lendacky@....com>
    x86/microcode/AMD: Add support for fam17h microcode loading

Aaron Ma <aaron.ma@...onical.com>
    Input: elantech - add new icbody type 15

Vineet Gupta <vgupta@...opsys.com>
    ARC: uaccess: dont use "l" gcc inline asm constraint modifier

Oleg Nesterov <oleg@...hat.com>
    kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal()

Oleg Nesterov <oleg@...hat.com>
    kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals

Oleg Nesterov <oleg@...hat.com>
    kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL

Thiago Rafael Becker <thiago.becker@...il.com>
    kernel: make groups_sort calling a responsibility group_info allocators

David Howells <dhowells@...hat.com>
    fscache: Fix the default for fscache_maybe_release_page()

Stefan BrĂ¼ns <stefan.bruens@...h-aachen.de>
    sunxi-rsb: Include OF based modalias in device uevent

Eric Biggers <ebiggers@...gle.com>
    crypto: pcrypt - fix freeing pcrypt instances

Eric Biggers <ebiggers@...gle.com>
    crypto: chacha20poly1305 - validate the digest size

Jan Engelhardt <jengelh@...i.de>
    crypto: n2 - cure use after free

Oleg Nesterov <oleg@...hat.com>
    kernel/acct.c: fix the acct->needcheck check in check_free_space()

Andrey Ryabinin <aryabinin@...tuozzo.com>
    x86/kasan: Write protect kasan zero shadow


-------------

Diffstat:

 Makefile                              |  4 ++--
 arch/arc/include/asm/uaccess.h        |  5 +++--
 arch/parisc/include/asm/ldcw.h        |  2 ++
 arch/parisc/kernel/entry.S            | 13 +++++++++++--
 arch/parisc/kernel/pacache.S          |  9 +++++++--
 arch/s390/kernel/compat_linux.c       |  1 +
 arch/x86/entry/vsyscall/vsyscall_64.c |  5 +++++
 arch/x86/include/asm/vsyscall.h       |  2 ++
 arch/x86/kernel/cpu/microcode/amd.c   |  4 ++++
 arch/x86/mm/init.c                    |  2 +-
 arch/x86/mm/kaiser.c                  | 34 ++++++++++++++++++++++++++++++----
 arch/x86/mm/kasan_init_64.c           | 10 ++++++++--
 crypto/chacha20poly1305.c             |  6 +++++-
 crypto/pcrypt.c                       | 19 ++++++++++---------
 drivers/bus/sunxi-rsb.c               |  1 +
 drivers/crypto/n2_core.c              |  3 +++
 drivers/input/mouse/elantech.c        |  2 +-
 drivers/mtd/nand/pxa3xx_nand.c        |  1 +
 fs/nfsd/auth.c                        |  3 +++
 include/linux/cred.h                  |  1 +
 include/linux/fscache.h               |  2 +-
 kernel/acct.c                         |  2 +-
 kernel/groups.c                       |  5 +++--
 kernel/module.c                       | 26 +++++++++++++++++++++-----
 kernel/signal.c                       | 18 ++++++++++--------
 kernel/uid16.c                        |  1 +
 mm/vmstat.c                           |  4 +++-
 net/sunrpc/auth_gss/gss_rpc_xdr.c     |  1 +
 net/sunrpc/auth_gss/svcauth_gss.c     |  1 +
 net/sunrpc/svcauth_unix.c             |  2 ++
 scripts/genksyms/genksyms.c           |  6 ++++--
 31 files changed, 149 insertions(+), 46 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ