lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210415144413.352638802@linuxfoundation.org>
Date:   Thu, 15 Apr 2021 16:46:54 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     linux-kernel@...r.kernel.org
Cc:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
        linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
        lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
        f.fainelli@...il.com, stable@...r.kernel.org
Subject: [PATCH 4.4 00/38] 4.4.267-rc1 review

This is the start of the stable review cycle for the 4.4.267 release.
There are 38 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sat, 17 Apr 2021 14:44:01 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.267-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.4.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <gregkh@...uxfoundation.org>
    Linux 4.4.267-rc1

Juergen Gross <jgross@...e.com>
    xen/events: fix setting irq affinity

Arnaldo Carvalho de Melo <acme@...hat.com>
    perf map: Tighten snprintf() string precision to pass gcc check on some 32-bit arches

Florian Westphal <fw@...len.de>
    netfilter: x_tables: fix compat match/target pad out-of-bound write

Arnd Bergmann <arnd@...db.de>
    drm/imx: imx-ldb: fix out of bounds array access warning

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: stop dump llsec params for monitors

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: forbid monitor for del llsec seclevel

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: forbid monitor for set llsec params

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: fix nl802154 del llsec devkey

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: fix nl802154 add llsec key

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: fix nl802154 del llsec dev

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: fix nl802154 del llsec key

Alexander Aring <aahringo@...hat.com>
    net: ieee802154: nl-mac: fix check on panid

Pavel Skripkin <paskripkin@...il.com>
    net: mac802154: Fix general protection fault

Pavel Skripkin <paskripkin@...il.com>
    drivers: net: fix memory leak in peak_usb_create_dev

Pavel Skripkin <paskripkin@...il.com>
    drivers: net: fix memory leak in atusb_probe

Phillip Potter <phil@...lpotter.co.uk>
    net: tun: set tun->dev->addr_len during TUNSETLINK processing

Du Cheng <ducheng2@...il.com>
    cfg80211: remove WARN_ON() in cfg80211_sme_connect

Krzysztof Kozlowski <krzysztof.kozlowski@...onical.com>
    clk: socfpga: fix iomem pointer cast on 64-bit

Potnuri Bharat Teja <bharat@...lsio.com>
    RDMA/cxgb4: check for ipv6 address properly while destroying listener

Alexander Gordeev <agordeev@...ux.ibm.com>
    s390/cpcmd: fix inline assembly register clobbering

Zqiang <qiang.zhang@...driver.com>
    workqueue: Move the position of debug_work_activate() in __queue_work()

Lukasz Bartosik <lb@...ihalf.com>
    clk: fix invalid usage of list cursor in unregister

Lv Yunlong <lyl2019@...l.ustc.edu.cn>
    net:tipc: Fix a double free in tipc_sk_mcast_rcv

Claudiu Manoil <claudiu.manoil@....com>
    gianfar: Handle error code at MAC address change

Eric Dumazet <edumazet@...gle.com>
    sch_red: fix off-by-one checks in red_check_params()

Pavel Tikhomirov <ptikhomirov@...tuozzo.com>
    net: sched: sch_teql: fix null-pointer dereference

Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
    batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field

Helge Deller <deller@....de>
    parisc: parisc-agp requires SBA IOMMU driver

Jack Qiu <jack.qiu@...wei.com>
    fs: direct-io: fix missing sdio->boundary

Sergei Trofimovich <slyfox@...too.org>
    ia64: fix user_stack_pointer() for ptrace()

Muhammad Usama Anjum <musamaanjum@...il.com>
    net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh

Luca Fancellu <luca.fancellu@....com>
    xen/evtchn: Change irq_info lock to raw_spinlock_t

Xiaoming Ni <nixiaoming@...wei.com>
    nfc: Avoid endless loops caused by repeated llcp_sock_connect()

Xiaoming Ni <nixiaoming@...wei.com>
    nfc: fix memory leak in llcp_sock_connect()

Xiaoming Ni <nixiaoming@...wei.com>
    nfc: fix refcount leak in llcp_sock_connect()

Xiaoming Ni <nixiaoming@...wei.com>
    nfc: fix refcount leak in llcp_sock_bind()

Jonas Holmberg <jonashg@...s.com>
    ALSA: aloop: Fix initialization of controls

Ye Xiang <xiang.ye@...el.com>
    iio: hid-sensor-prox: Fix scale not correct issue


-------------

Diffstat:

 Makefile                                     |  4 +--
 arch/ia64/include/asm/ptrace.h               |  8 +----
 arch/s390/kernel/cpcmd.c                     |  6 ++--
 drivers/char/agp/Kconfig                     |  2 +-
 drivers/clk/clk.c                            | 30 ++++++++---------
 drivers/clk/socfpga/clk-gate.c               |  2 +-
 drivers/gpu/drm/imx/imx-ldb.c                | 10 ++++++
 drivers/iio/light/hid-sensor-prox.c          | 14 ++++++--
 drivers/infiniband/hw/cxgb4/cm.c             |  3 +-
 drivers/net/can/usb/peak_usb/pcan_usb_core.c |  6 +++-
 drivers/net/ethernet/freescale/gianfar.c     |  6 +++-
 drivers/net/ieee802154/atusb.c               |  1 +
 drivers/net/tun.c                            | 48 ++++++++++++++++++++++++++++
 drivers/xen/events/events_base.c             | 14 ++++----
 drivers/xen/events/events_internal.h         |  2 +-
 fs/direct-io.c                               |  5 +--
 include/net/red.h                            |  4 +--
 kernel/workqueue.c                           |  2 +-
 net/batman-adv/translation-table.c           |  1 +
 net/ieee802154/nl-mac.c                      |  7 ++--
 net/ieee802154/nl802154.c                    | 23 ++++++++++---
 net/ipv4/netfilter/arp_tables.c              |  2 ++
 net/ipv4/netfilter/ip_tables.c               |  2 ++
 net/ipv6/netfilter/ip6_tables.c              |  2 ++
 net/ipv6/route.c                             |  8 +++--
 net/mac802154/llsec.c                        |  2 +-
 net/netfilter/x_tables.c                     | 10 ++----
 net/nfc/llcp_sock.c                          | 10 ++++++
 net/sched/sch_teql.c                         |  3 ++
 net/tipc/socket.c                            |  2 +-
 net/wireless/sme.c                           |  2 +-
 sound/drivers/aloop.c                        | 11 +++++--
 tools/perf/util/map.c                        |  7 ++--
 33 files changed, 183 insertions(+), 76 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ