[linux] 01/01: Merge tag 'debian/3.16.7-ckt25-2+deb8u3' into wheezy-backports

debian-kernel at lists.debian.org debian-kernel at lists.debian.org
Sat Jul 9 13:58:17 UTC 2016


This is an automated email from the git hooks/post-receive script.

benh pushed a commit to branch wheezy-backports
in repository linux.

commit 7bf324974cc12c565f1990538d2410a5ae69e6e2
Merge: 1e65e1c 10e2424
Author: Ben Hutchings <ben at decadent.org.uk>
Date:   Thu Jul 7 11:32:39 2016 +0200

    Merge tag 'debian/3.16.7-ckt25-2+deb8u3' into wheezy-backports

 debian/changelog                                   | 121 ++++
 debian/config/defines                              |   1 +
 ...ilter-ensure-number-of-counters-is-0-in-d.patch |  53 ++
 ...B-usbip-fix-potential-out-of-bounds-write.patch |  46 ++
 ...sa-compress-fix-an-integer-overflow-check.patch |  31 +
 ...fix-leak-in-events-via-snd_timer_user_cca.patch |  33 +
 ...fix-leak-in-events-via-snd_timer_user_tin.patch |  33 +
 ...imer-fix-leak-in-sndrv_timer_ioctl_params.patch |  33 +
 ...dio-add-sanity-checks-for-endpoint-access.patch |  71 ++
 ...dio-fix-null-dereference-in-create_fixed_.patch |  34 +
 ...able-unimplemented-scatter-gather-feature.patch |  37 +
 ...not-call-usbnet_link_change-from-cdc_ncm_.patch |  81 +++
 ...cryptfs-fix-handling-of-directory-opening.patch | 139 ++++
 ...forbid-opening-files-without-mmap-handler.patch |  54 ++
 ...de.c-treat-zero-mnt_group_id-s-as-unequal.patch |  78 ++
 ...idge_filename-handle-malformed-NM-entries.patch |  63 ++
 ...validate-num_values-for-hidiocgusages-hid.patch |  41 ++
 ...urity-restrict-use-of-the-write-interface.patch | 156 ++++
 ...linux-poison.h-fix-list_poison-1-2-offset.patch |  44 ++
 ...k-fix-crash-on-detecting-device-without-e.patch |  44 ++
 ...emote2-fix-crashes-on-detecting-device-wi.patch | 106 +++
 ...fix-crash-on-detecting-device-without-end.patch |  51 ++
 ...mate-fix-oops-with-malicious-usb-descript.patch |  35 +
 ...do-expensive-useless-work-during-inetdev-.patch |  98 +++
 .../keys-potential-uninitialized-variable.patch    |  86 +++
 ...allow-hugepages_supported-to-be-architect.patch |  50 ++
 ...-page-without-clear_page_dirty_for_io-etc.patch | 154 ++++
 .../net-fix-a-kernel-infoleak-in-x25-module.patch  |  29 +
 .../bugfix/all/net-fix-infoleak-in-llc.patch       |  29 +
 .../bugfix/all/net-fix-infoleak-in-rtnetlink.patch |  46 ++
 ...rp_tables-simplify-translate_compat_table.patch | 208 ++++++
 ...nsure-number-of-counters-is-0-in-do_repla.patch | 120 ++++
 ...p6_tables-simplify-translate_compat_table.patch | 185 +++++
 ...p_tables-simplify-translate_compat_table-.patch | 184 +++++
 ..._tables-add-and-use-xt_check_entry_offset.patch | 151 ++++
 ..._tables-add-compat-version-of-xt_check_en.patch | 105 +++
 ...ilter-x_tables-assert-minimum-target-size.patch |  25 +
 ...er-x_tables-check-for-bogus-target-offset.patch | 164 +++++
 ...r-x_tables-check-standard-target-size-too.patch |  60 ++
 ..._tables-do-compat-validation-via-translat.patch | 781 +++++++++++++++++++++
 ..._tables-don-t-move-to-non-existent-next-r.patch | 100 +++
 ..._tables-don-t-reject-valid-target-size-on.patch |  54 ++
 ...tfilter-x_tables-fix-unconditional-helper.patch | 226 ++++++
 ..._tables-introduce-and-use-xt_copy_counter.patch | 331 +++++++++
 ...etfilter-x_tables-kill-check_entry-helper.patch | 149 ++++
 ...-sure-e-next_offset-covers-remaining-blob.patch |  83 +++
 ..._tables-validate-all-offsets-and-sizes-in.patch | 137 ++++
 ...r-x_tables-validate-e-target_offset-early.patch | 193 +++++
 ...filter-x_tables-validate-targets-of-jumps.patch | 131 ++++
 ..._tables-xt_compat_match_from_user-doesn-t.patch | 234 ++++++
 .../nfsd-check-permissions-when-setting-ACLs.patch | 146 ++++
 .../bugfix/all/posix_acl-Add-set_posix_acl.patch   |  82 +++
 .../all/ppp-take-reference-on-channels-netns.patch | 144 ++++
 ...nt-Handle-the-first-propogated-copy-being.patch | 131 ++++
 .../rds-fix-an-infoleak-in-rds_inc_info_copy.patch |  31 +
 ...x-an-infoleak-in-tipc_nl_compat_link_dump.patch |  26 +
 .../all/usb-cdc-acm-more-sanity-checking.patch     |  29 +
 .../usb-cypress_m8-add-endpoint-sanity-check.patch |  46 ++
 ...celeport-do-sanity-checking-for-the-numbe.patch |  49 ++
 ...usb-mct_u232-add-sanity-checking-in-probe.patch |  46 ++
 ...usb-usbfs-fix-potential-infoleak-in-devio.patch |  41 ++
 .../all/usbnet-cleanup-after-bind-in-probe.patch   |  36 +
 ...always-reclaim-in-start_thread-for-exec-c.patch | 106 +++
 .../s390-mm-four-page-table-levels-vs.-fork.patch  | 114 +++
 ...tl-fix-potential-information-leak-with-de.patch |  52 ++
 ...x-for-double-fetch-security-bug-in-vop-dr.patch |  37 +
 ...compat-add-missing-clac-to-entry_int80_32.patch |  45 ++
 ...64-properly-context-switch-iopl-on-xen-pv.patch |  97 +++
 ...ble-full-randomization-on-i386-and-x86_32.patch |  79 +++
 ...86-mm-xen-Suppress-hugetlbfs-in-PV-guests.patch |  72 ++
 .../x86/x86-standardize-mmap_rnd-usage.patch       |  99 +++
 .../debian/migrate-fix-abi-change-in-3.16.36.patch |  20 +
 debian/patches/series                              |  70 ++
 73 files changed, 7096 insertions(+)

diff --cc debian/changelog
index c6007e1,b51f2c8..37e5a6a
--- a/debian/changelog
+++ b/debian/changelog
@@@ -1,15 -1,112 +1,136 @@@
++linux (3.16.7-ckt25-2+deb8u3~bpo70+1) wheezy-backports; urgency=medium
++
++  * Rebuild for wheezy:
++    - Disable architectures that weren't part of wheezy
++    - Use gcc-4.6 for all architectures
++    - Change ABI number to 0.bpo.4
++    - [arm] btrfs: Work around bug in gcc-4.6 (fixes FTBFS)
++    - linux-image: Depend on initramfs-tools without any alternatives, so
++      that neither apt nor aptitude will automatically switch to dracut
++
++ -- Ben Hutchings <ben at decadent.org.uk>  Thu, 07 Jul 2016 11:29:27 +0200
++
+ linux (3.16.7-ckt25-2+deb8u3) jessie-security; urgency=high
+ 
+   [ Salvatore Bonaccorso ]
+   * Revert "netfilter: ensure number of counters is >0 in do_replace()"
+     Fixes regression introduced in 3.16.7-ckt25-2+deb8u2. Setting rules with
+     ebtables did not work any more.
+     Thanks to Jacob Lundberg <jacob at collegenet.com> (Closes: #828914)
+ 
+   [ Ben Hutchings ]
+   * ALSA: compress: fix an integer overflow check (CVE-2014-9904)
+   * [amd64] misc: mic: Fix for double fetch security bug in VOP driver
+     (CVE-2016-5728)
+   * [powerpc*] tm: Always reclaim in start_thread() for exec() class syscalls
+     (CVE-2016-5828)
+   * HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands
+     (CVE-2016-5829)
+   * [s390*] sclp_ctl: fix potential information leak with /dev/sclp
+     (CVE-2016-6130)
+ 
+  -- Salvatore Bonaccorso <carnil at debian.org>  Sat, 02 Jul 2016 13:30:12 +0200
+ 
+ linux (3.16.7-ckt25-2+deb8u2) jessie-security; urgency=high
+ 
+   * Fix backport of "netfilter: x_tables: validate targets of jumps"
+   * netfilter: ensure number of counters is >0 in do_replace()
+ 
+  -- Ben Hutchings <ben at decadent.org.uk>  Sat, 25 Jun 2016 23:36:47 +0200
+ 
+ linux (3.16.7-ckt25-2+deb8u1) jessie-security; urgency=high
+ 
+   [ Ben Hutchings ]
+   * include/linux/poison.h: fix LIST_POISON{1,2} offset (CVE-2016-0821)
+   * [s390*] mm: four page table levels vs. fork (CVE-2016-2143)
+   * [amd64] iopl: Properly context-switch IOPL on Xen PV (CVE-2016-3157)
+   * [amd64] entry/compat: Add missing CLAC to entry_INT80_32
+   * netfilter: x_tables: Fix parsing of IPT_SO_SET_REPLACE blobs
+     (CVE-2016-3134, CVE-2016-4997, CVE-2016-4998)
+     - validate e->target_offset early
+     - make sure e->next_offset covers remaining blob size
+     - fix unconditional helper
+     - don't move to non-existent next rule
+     - validate targets of jumps
+     - add and use xt_check_entry_offsets
+     - kill check_entry helper
+     - assert minimum target size
+     - add compat version of xt_check_entry_offsets
+     - check standard target size too
+     - check for bogus target offset
+     - validate all offsets and sizes in a rule
+     - don't reject valid target size on some
+     - arp_tables: simplify translate_compat_table args
+     - ip_tables: simplify translate_compat_table args
+     - ip6_tables: simplify translate_compat_table args
+     - xt_compat_match_from_user doesn't need a retval
+     - do compat validation via translate_table
+     - introduce and use xt_copy_counters_from_user
+   * Ignore ABI change in x_tables
+   * ipv4: Don't do expensive useless work during inetdev destroy.
+     (CVE-2016-3156)
+   * [x86] standardize mmap_rnd() usage
+   * [x86] mm/32: Enable full randomization on i386 and X86_32 (CVE-2016-3672)
+   * usbnet: Fix possible memory corruption after probe failure (CVE-2016-3951)
+     - cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
+     - usbnet: cleanup after bind() in probe()
+   * atl2: Disable unimplemented scatter/gather feature (CVE-2016-2117)
+   * mm: hugetlb: allow hugepages_supported to be architecture specific
+   * ecryptfs: fix handling of directory opening
+   * ecryptfs: forbid opening files without mmap handler (CVE-2016-1583)
+   * Input: aiptek - fix crash on detecting device without endpoints
+     (CVE-2015-7515)
+   * ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()
+     (CVE-2016-2184)
+   * ALSA: usb-audio: Add sanity checks for endpoint accesses
+   * Input: ati_remote2 - fix crashes on detecting device with invalid
+     descriptor (CVE-2016-2185)
+   * Input: powermate - fix oops with malicious USB descriptors (CVE-2016-2186)
+   * Input: gtco - fix crash on detecting device without endpoints
+     (CVE-2016-2187)
+   * USB: mct_u232: add sanity checking in probe (CVE-2016-3136)
+   * USB: cypress_m8: add endpoint sanity check (CVE-2016-3137)
+   * USB: cdc-acm: more sanity checking (CVE-2016-3138)
+   * USB: digi_acceleport: do sanity checking for the number of ports
+     (CVE-2016-3140)
+   * mm: migrate dirty page without clear_page_dirty_for_io etc (CVE-2016-3070)
+   * migrate: Fix ABI change
+   * net: fix infoleak in llc (CVE-2016-4485)
+   * net: fix infoleak in rtnetlink (CVE-2016-4486)
+   * net: fix a kernel infoleak in x25 module (CVE-2016-4580)
+   * IB/security: Restrict use of the write() interface (CVE-2016-4565)
+   * ppp: take reference on channels netns (CVE-2016-4805)
+   * KEYS: potential uninitialized variable (CVE-2016-4470)
+ 
+   [ Salvatore Bonaccorso ]
+   * [x86] USB: usbip: fix potential out-of-bounds write (CVE-2016-3955)
+   * [x86] xen: suppress hugetlbfs in PV guests (CVE-2016-3961)
+   * get_rock_ridge_filename(): handle malformed NM entries (CVE-2016-4913)
+   * fs/pnode.c: treat zero mnt_group_id-s as unequal
+   * propogate_mnt: Handle the first propogated copy being a slave
+     (CVE-2016-4581)
+   * USB: usbfs: fix potential infoleak in devio (CVE-2016-4482)
+   * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (CVE-2016-4569)
+   * ALSA: timer: Fix leak in events via snd_timer_user_ccallback or
+     snd_timer_user_tinterrupt (CVE-2016-4578)
+   * tipc: fix an infoleak in tipc_node_get_links (CVE-2016-5243)
+   * rds: fix an infoleak in rds_inc_info_copy (CVE-2016-5244)
+   * nfsd: check permissions when setting ACLs (CVE-2016-1237)
+ 
+  -- Ben Hutchings <ben at decadent.org.uk>  Sat, 25 Jun 2016 12:47:15 +0200
+ 
 +linux (3.16.7-ckt25-2~bpo70+1) wheezy-backports; urgency=medium
 +
 +  * Rebuild for wheezy:
 +    - Disable architectures that weren't part of wheezy
 +    - Use gcc-4.6 for all architectures
 +    - Change ABI number to 0.bpo.4
 +    - [arm] btrfs: Work around bug in gcc-4.6 (fixes FTBFS)
 +    - linux-image: Depend on initramfs-tools without any alternatives, so
 +      that neither apt nor aptitude will automatically switch to dracut
 +
 + -- Ben Hutchings <ben at decadent.org.uk>  Wed, 13 Apr 2016 00:39:02 +0100
 +
  linux (3.16.7-ckt25-2) jessie; urgency=medium
  
    * Revert "drm/radeon: hold reference to fences in radeon_sa_bo_new"

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git



More information about the Kernel-svn-changes mailing list