lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190318084210.397476003@linuxfoundation.org>
Date:   Mon, 18 Mar 2019 10:25:35 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
        ben.hutchings@...ethink.co.uk, lkft-triage@...ts.linaro.org,
        stable@...r.kernel.org
Subject: [PATCH 4.9 00/31] 4.9.164-stable review

This is the start of the stable review cycle for the 4.9.164 release.
There are 31 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Wed Mar 20 08:42:01 UTC 2019.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.164-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.9.164-rc1

Zha Bin <zhabin@...ux.alibaba.com>
    vhost/vsock: fix vhost vsock cid hashing inconsistent

Sakari Ailus <sakari.ailus@...ux.intel.com>
    of: Support const and non-const use for to_of_node()

Sergei Shtylyov <sergei.shtylyov@...entembedded.com>
    mmc: tmio_mmc_core: don't claim spurious interrupts

Xiao Ni <xni@...hat.com>
    It's wrong to add len to sector_nr in raid10 reshape twice

Takashi Sakamoto <o-takashi@...amocchi.jp>
    ALSA: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56

Peter Zijlstra <peterz@...radead.org>
    perf/x86: Fixup typo in stub functions

Eric Dumazet <edumazet@...gle.com>
    tcp/dccp: remove reqsk_put() from inet_child_forget()

Eric Dumazet <edumazet@...gle.com>
    gro_cells: make sure device is up in gro_cells_receive()

David Howells <dhowells@...hat.com>
    rxrpc: Fix client call queueing, waiting for channel

Stefano Brivio <sbrivio@...hat.com>
    vxlan: Fix GRO cells race condition between receive and link delete

Daniel Borkmann <daniel@...earbox.net>
    ipvlan: disallow userns cap_net_admin to change global mode/flags

Al Viro <viro@...iv.linux.org.uk>
    missing barriers in some of unix_sock ->addr and ->path accesses

Kalash Nainwal <kalash@...sta.com>
    net: Set rtm_table to RT_TABLE_COMPAT for ipv6 for tables > 255

YueHaibing <yuehaibing@...wei.com>
    mdio_bus: Fix use-after-free on device_register fails

Eric Dumazet <edumazet@...gle.com>
    net/x25: fix a race in x25_bind()

Jack Morgenstein <jackm@....mellanox.co.il>
    net/mlx4_core: Fix qp mtt size calculation

Jack Morgenstein <jackm@....mellanox.co.il>
    net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling

Jack Morgenstein <jackm@....mellanox.co.il>
    net/mlx4_core: Fix reset flow when in command polling mode

Eric Dumazet <edumazet@...gle.com>
    vxlan: test dev->flags & IFF_UP before calling gro_cells_receive()

Guillaume Nault <gnault@...hat.com>
    tcp: handle inet_csk_reqsk_queue_add() failures

Xin Long <lucien.xin@...il.com>
    route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race

Masaru Nagai <masaru.nagai.vx@...esas.com>
    ravb: Decrease TxFIFO depth of Q3 and Q2 to one

Xin Long <lucien.xin@...il.com>
    pptp: dst_release sk_dst_cache in pptp_sock_destruct

Eric Dumazet <edumazet@...gle.com>
    net/x25: reset state in x25_connect()

Eric Dumazet <edumazet@...gle.com>
    net/x25: fix use-after-free in x25_device_event()

Miaohe Lin <linmiaohe@...wei.com>
    net: sit: fix UBSAN Undefined behaviour in check_6rd

Eric Dumazet <edumazet@...gle.com>
    net/hsr: fix possible crash in add_timer()

Mao Wenan <maowenan@...wei.com>
    net: hsr: fix memory leak in hsr_dev_finalize()

Eric Dumazet <edumazet@...gle.com>
    l2tp: fix infoleak in l2tp_ip6_recvmsg()

Eric Biggers <ebiggers@...gle.com>
    KEYS: restrict /proc/keys by credentials at open time

Erik Schmauss <erik.schmauss@...el.com>
    ACPICA: Reference Counts: increase max to 0x4000 for large servers


-------------

Diffstat:

 Makefile                                           |  4 +-
 arch/x86/events/perf_event.h                       |  4 +-
 drivers/md/raid10.c                                |  1 -
 drivers/mmc/host/tmio_mmc_pio.c                    | 11 +++--
 drivers/net/ethernet/mellanox/mlx4/cmd.c           |  9 ++++
 .../net/ethernet/mellanox/mlx4/resource_tracker.c  |  6 +--
 drivers/net/ethernet/renesas/ravb_main.c           |  2 +-
 drivers/net/ipvlan/ipvlan_main.c                   |  9 +++-
 drivers/net/phy/mdio_bus.c                         |  1 -
 drivers/net/ppp/pptp.c                             |  1 +
 drivers/net/vxlan.c                                | 14 ++++++-
 drivers/vhost/vsock.c                              |  2 +-
 include/acpi/acconfig.h                            |  2 +-
 include/linux/of.h                                 | 20 +++++----
 include/net/gro_cells.h                            | 22 ++++++++--
 net/hsr/hsr_device.c                               | 18 ++++----
 net/hsr/hsr_framereg.c                             | 12 ++++++
 net/hsr/hsr_framereg.h                             |  1 +
 net/ipv4/inet_connection_sock.c                    |  2 +-
 net/ipv4/route.c                                   |  4 ++
 net/ipv4/syncookies.c                              |  7 +++-
 net/ipv4/tcp_input.c                               |  8 +++-
 net/ipv6/route.c                                   |  2 +-
 net/ipv6/sit.c                                     |  5 ++-
 net/l2tp/l2tp_ip6.c                                |  4 +-
 net/rxrpc/conn_client.c                            |  4 +-
 net/unix/af_unix.c                                 | 48 +++++++++++++---------
 net/unix/diag.c                                    |  3 +-
 net/x25/af_x25.c                                   | 20 ++++++---
 security/keys/proc.c                               |  8 +---
 security/lsm_audit.c                               | 10 +++--
 sound/firewire/bebob/bebob.c                       | 14 ++++++-
 32 files changed, 191 insertions(+), 87 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ