lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <lsq.1591898928.276150302@decadent.org.uk>
Date:   Thu, 11 Jun 2020 19:35:15 +0100
From:   Ben Hutchings <ben@...adent.org.uk>
To:     linux-kernel@...r.kernel.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        torvalds@...ux-foundation.org, Jiri Slaby <jslaby@...e.cz>,
        stable@...r.kernel.org
Cc:     lwn@....net
Subject: Linux 3.16.85

I'm announcing the release of the 3.16.85 kernel.  This is probably
the last release in the 3.16 stable series, unless some critical fix
comes up later this month.

All users of the 3.16 kernel series should upgrade.

The updated 3.16.y git tree can be found at:
        https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.16.y
and can be browsed at the normal kernel.org git web browser:
        https://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git

The diff from 3.16.84 is attached to this message.

Ben.

------------

 Documentation/ABI/testing/sysfs-devices-system-cpu |   1 +
 .../special-register-buffer-data-sampling.rst      | 149 ++++
 Documentation/kernel-parameters.txt                |  20 +
 Makefile                                           |   2 +-
 arch/x86/include/asm/acpi.h                        |   2 +-
 arch/x86/include/asm/cpu_device_id.h               |  27 +
 arch/x86/include/asm/cpufeatures.h                 |   2 +
 arch/x86/include/asm/processor.h                   |   2 +-
 arch/x86/include/uapi/asm/msr-index.h              |   4 +
 arch/x86/kernel/amd_nb.c                           |   2 +-
 arch/x86/kernel/asm-offsets_32.c                   |   2 +-
 arch/x86/kernel/cpu/amd.c                          |  28 +-
 arch/x86/kernel/cpu/bugs.c                         | 106 +++
 arch/x86/kernel/cpu/centaur.c                      |   4 +-
 arch/x86/kernel/cpu/common.c                       |  62 +-
 arch/x86/kernel/cpu/cpu.h                          |   1 +
 arch/x86/kernel/cpu/cyrix.c                        |   2 +-
 arch/x86/kernel/cpu/intel.c                        |  18 +-
 arch/x86/kernel/cpu/match.c                        |   7 +-
 arch/x86/kernel/cpu/microcode/intel.c              |   4 +-
 arch/x86/kernel/cpu/mtrr/generic.c                 |   2 +-
 arch/x86/kernel/cpu/mtrr/main.c                    |   4 +-
 arch/x86/kernel/cpu/perf_event_intel.c             |   2 +-
 arch/x86/kernel/cpu/perf_event_intel_lbr.c         |   2 +-
 arch/x86/kernel/cpu/perf_event_p6.c                |   2 +-
 arch/x86/kernel/cpu/proc.c                         |   4 +-
 arch/x86/kernel/head_32.S                          |   4 +-
 arch/x86/kernel/mpparse.c                          |   2 +-
 drivers/base/cpu.c                                 |   8 +
 drivers/char/hw_random/via-rng.c                   |   2 +-
 drivers/char/random.c                              |   3 -
 drivers/cpufreq/acpi-cpufreq.c                     |   2 +-
 drivers/cpufreq/longhaul.c                         |   6 +-
 drivers/cpufreq/p4-clockmod.c                      |   2 +-
 drivers/cpufreq/powernow-k7.c                      |   2 +-
 drivers/cpufreq/speedstep-centrino.c               |   4 +-
 drivers/cpufreq/speedstep-lib.c                    |   6 +-
 drivers/crypto/padlock-aes.c                       |   2 +-
 drivers/edac/amd64_edac.c                          |   2 +-
 drivers/edac/mce_amd.c                             |   2 +-
 drivers/hwmon/coretemp.c                           |   6 +-
 drivers/hwmon/hwmon-vid.c                          |   2 +-
 drivers/hwmon/k10temp.c                            |   2 +-
 drivers/hwmon/k8temp.c                             |   2 +-
 drivers/message/fusion/mptctl.c                    | 215 ++----
 drivers/net/can/slcan.c                            |   4 +
 drivers/net/slip/slip.c                            |   4 +
 drivers/net/wireless/mwifiex/scan.c                |   7 +
 drivers/net/wireless/mwifiex/wmm.c                 |   4 +
 drivers/scsi/sg.c                                  | 758 +++++++++++----------
 drivers/usb/core/message.c                         |  53 +-
 drivers/usb/gadget/configfs.c                      |   3 +
 drivers/video/fbdev/geode/video_gx.c               |   2 +-
 fs/binfmt_elf.c                                    |   2 +-
 fs/exec.c                                          |   2 +-
 fs/ext4/block_validity.c                           |  57 ++
 fs/ext4/ext4.h                                     |  19 +-
 fs/ext4/extents.c                                  |  13 +-
 fs/ext4/inode.c                                    |   5 +
 include/linux/mod_devicetable.h                    |   6 +
 include/linux/sched.h                              |   4 +-
 include/scsi/sg.h                                  |   1 -
 kernel/signal.c                                    |   2 +-
 net/core/net-sysfs.c                               |  39 +-
 security/selinux/hooks.c                           |  70 +-
 65 files changed, 1102 insertions(+), 688 deletions(-)

Akinobu Mita (1):
      sg: prevent integer overflow when converting from sectors to bytes

Alan Stern (1):
      USB: core: Fix free-while-in-use bug in the USB S-Glibrary

Alexander Potapenko (1):
      fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()

Ben Hutchings (3):
      scsi: sg: Change next_cmd_len handling to mirror upstream
      scsi: sg: Re-fix off by one in sg_fill_request_table()
      Linux 3.16.85

Colin Ian King (1):
      ext4: unsigned int compared against zero

Dan Carpenter (3):
      scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo()
      scsi: mptfusion: Fix double fetch bug in ioctl
      scsi: sg: off by one in sg_ioctl()

David Mosberger (2):
      drivers: usb: core: Don't disable irqs in usb_sg_wait() during URB submit.
      drivers: usb: core: Minimize irq disabling in usb_sg_cancel()

Douglas Gilbert (1):
      sg: O_EXCL and other lock handling

Eric Dumazet (1):
      net-sysfs: fix netdev_queue_add_kobject() breakage

Eric W. Biederman (1):
      signal: Extend exec_id to 64bits

Hannes Reinecke (8):
      scsi: sg: protect accesses to 'reserved' page array
      scsi: sg: reset 'res_in_use' after unlinking reserved array
      scsi: sg: remove 'save_scat_len'
      scsi: sg: use standard lists for sg_requests
      scsi: sg: factor out sg_fill_request_table()
      scsi: sg: fixup infoleak when using SG_GET_REQUEST_TABLE
      scsi: sg: disable SET_FORCE_LOW_DMA
      scsi: sg: close race condition in sg_remove_sfp_usercontext()

Jason A. Donenfeld (1):
      random: always use batched entropy for get_random_u{32,64}

Jia Zhang (1):
      x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_stepping

Johannes Thumshirn (5):
      scsi: sg: check for valid direction before starting the request
      scsi: sg: fix SG_DXFER_FROM_DEV transfers
      scsi: sg: fix static checker warning in sg_is_valid_dxfer
      scsi: sg: only check for dxfer_len greater than 256M
      scsi: sg: don't return bogus Sg_requests

Josh Poimboeuf (1):
      x86/speculation: Add Ivy Bridge to affected list

Jouni Hogander (7):
      slcan: Fix memory leak in error path
      can: slcan: Fix use-after-free Read in slcan_open
      slip: Fix memory leak in slip_open error path
      slip: Fix use-after-free Read in slip_open
      net-sysfs: Fix reference count leak in rx|netdev_queue_add_kobject
      net-sysfs: Call dev_hold always in netdev_queue_add_kobject
      net-sysfs: Call dev_hold always in rx_queue_add_kobject

Kyungtae Kim (1):
      USB: gadget: fix illegal array access in binding with UDC

Li Bin (1):
      scsi: sg: add sg_remove_request in sg_common_write

Marek Milkovic (1):
      selinux: Print 'sclass' as string when unrecognized netlink message occurs

Mark Gross (4):
      x86/cpu: Add a steppings field to struct x86_cpu_id
      x86/cpu: Add 'table' argument to cpu_matches()
      x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
      x86/speculation: Add SRBDS vulnerability and mitigation documentation

Oliver Hartkopp (1):
      slcan: not call free_netdev before rtnl_unlock in slcan_open

Paul Moore (1):
      selinux: properly handle multiple messages in selinux_netlink_send()

Qing Xu (2):
      mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv()
      mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()

Richard Guy Briggs (2):
      selinux: cleanup error reporting in selinux_nlmsg_perm()
      selinux: convert WARN_ONCE() to printk() in selinux_nlmsg_perm()

Shijie Luo (1):
      ext4: add cond_resched() to ext4_protect_reserved_inode

Tahsin Erdogan (1):
      ext4: Make checks for metadata_csum feature safer

Theodore Ts'o (3):
      ext4: protect journal inode's blocks using block_validity
      ext4: fix block validity checks for journal inodes using indirect blocks
      ext4: don't perform block validity checks on the journal inode

Todd Poynor (2):
      scsi: sg: protect against races between mmap() and SG_SET_RESERVED_SIZE
      scsi: sg: recheck MMAP_IO request length with lock held

Tony Battersby (1):
      scsi: sg: fix minor memory leak in error path

Vladis Dronov (1):
      selinux: rate-limit netlink message warnings in selinux_nlmsg_perm()

Wu Bo (1):
      scsi: sg: add sg_remove_request in sg_write

yangerkun (1):
      slip: not call free_netdev before rtnl_unlock in slip_open


View attachment "linux-3.16.85.patch" of type "text/x-diff" (135727 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ