[linux] 01/01: Merge tag 'debian/3.16.7-ckt25-2+deb8u3' into wheezy-backports
debian-kernel at lists.debian.org
debian-kernel at lists.debian.org
Sat Jul 9 13:58:17 UTC 2016
This is an automated email from the git hooks/post-receive script.
benh pushed a commit to branch wheezy-backports
in repository linux.
commit 7bf324974cc12c565f1990538d2410a5ae69e6e2
Merge: 1e65e1c 10e2424
Author: Ben Hutchings <ben at decadent.org.uk>
Date: Thu Jul 7 11:32:39 2016 +0200
Merge tag 'debian/3.16.7-ckt25-2+deb8u3' into wheezy-backports
debian/changelog | 121 ++++
debian/config/defines | 1 +
...ilter-ensure-number-of-counters-is-0-in-d.patch | 53 ++
...B-usbip-fix-potential-out-of-bounds-write.patch | 46 ++
...sa-compress-fix-an-integer-overflow-check.patch | 31 +
...fix-leak-in-events-via-snd_timer_user_cca.patch | 33 +
...fix-leak-in-events-via-snd_timer_user_tin.patch | 33 +
...imer-fix-leak-in-sndrv_timer_ioctl_params.patch | 33 +
...dio-add-sanity-checks-for-endpoint-access.patch | 71 ++
...dio-fix-null-dereference-in-create_fixed_.patch | 34 +
...able-unimplemented-scatter-gather-feature.patch | 37 +
...not-call-usbnet_link_change-from-cdc_ncm_.patch | 81 +++
...cryptfs-fix-handling-of-directory-opening.patch | 139 ++++
...forbid-opening-files-without-mmap-handler.patch | 54 ++
...de.c-treat-zero-mnt_group_id-s-as-unequal.patch | 78 ++
...idge_filename-handle-malformed-NM-entries.patch | 63 ++
...validate-num_values-for-hidiocgusages-hid.patch | 41 ++
...urity-restrict-use-of-the-write-interface.patch | 156 ++++
...linux-poison.h-fix-list_poison-1-2-offset.patch | 44 ++
...k-fix-crash-on-detecting-device-without-e.patch | 44 ++
...emote2-fix-crashes-on-detecting-device-wi.patch | 106 +++
...fix-crash-on-detecting-device-without-end.patch | 51 ++
...mate-fix-oops-with-malicious-usb-descript.patch | 35 +
...do-expensive-useless-work-during-inetdev-.patch | 98 +++
.../keys-potential-uninitialized-variable.patch | 86 +++
...allow-hugepages_supported-to-be-architect.patch | 50 ++
...-page-without-clear_page_dirty_for_io-etc.patch | 154 ++++
.../net-fix-a-kernel-infoleak-in-x25-module.patch | 29 +
.../bugfix/all/net-fix-infoleak-in-llc.patch | 29 +
.../bugfix/all/net-fix-infoleak-in-rtnetlink.patch | 46 ++
...rp_tables-simplify-translate_compat_table.patch | 208 ++++++
...nsure-number-of-counters-is-0-in-do_repla.patch | 120 ++++
...p6_tables-simplify-translate_compat_table.patch | 185 +++++
...p_tables-simplify-translate_compat_table-.patch | 184 +++++
..._tables-add-and-use-xt_check_entry_offset.patch | 151 ++++
..._tables-add-compat-version-of-xt_check_en.patch | 105 +++
...ilter-x_tables-assert-minimum-target-size.patch | 25 +
...er-x_tables-check-for-bogus-target-offset.patch | 164 +++++
...r-x_tables-check-standard-target-size-too.patch | 60 ++
..._tables-do-compat-validation-via-translat.patch | 781 +++++++++++++++++++++
..._tables-don-t-move-to-non-existent-next-r.patch | 100 +++
..._tables-don-t-reject-valid-target-size-on.patch | 54 ++
...tfilter-x_tables-fix-unconditional-helper.patch | 226 ++++++
..._tables-introduce-and-use-xt_copy_counter.patch | 331 +++++++++
...etfilter-x_tables-kill-check_entry-helper.patch | 149 ++++
...-sure-e-next_offset-covers-remaining-blob.patch | 83 +++
..._tables-validate-all-offsets-and-sizes-in.patch | 137 ++++
...r-x_tables-validate-e-target_offset-early.patch | 193 +++++
...filter-x_tables-validate-targets-of-jumps.patch | 131 ++++
..._tables-xt_compat_match_from_user-doesn-t.patch | 234 ++++++
.../nfsd-check-permissions-when-setting-ACLs.patch | 146 ++++
.../bugfix/all/posix_acl-Add-set_posix_acl.patch | 82 +++
.../all/ppp-take-reference-on-channels-netns.patch | 144 ++++
...nt-Handle-the-first-propogated-copy-being.patch | 131 ++++
.../rds-fix-an-infoleak-in-rds_inc_info_copy.patch | 31 +
...x-an-infoleak-in-tipc_nl_compat_link_dump.patch | 26 +
.../all/usb-cdc-acm-more-sanity-checking.patch | 29 +
.../usb-cypress_m8-add-endpoint-sanity-check.patch | 46 ++
...celeport-do-sanity-checking-for-the-numbe.patch | 49 ++
...usb-mct_u232-add-sanity-checking-in-probe.patch | 46 ++
...usb-usbfs-fix-potential-infoleak-in-devio.patch | 41 ++
.../all/usbnet-cleanup-after-bind-in-probe.patch | 36 +
...always-reclaim-in-start_thread-for-exec-c.patch | 106 +++
.../s390-mm-four-page-table-levels-vs.-fork.patch | 114 +++
...tl-fix-potential-information-leak-with-de.patch | 52 ++
...x-for-double-fetch-security-bug-in-vop-dr.patch | 37 +
...compat-add-missing-clac-to-entry_int80_32.patch | 45 ++
...64-properly-context-switch-iopl-on-xen-pv.patch | 97 +++
...ble-full-randomization-on-i386-and-x86_32.patch | 79 +++
...86-mm-xen-Suppress-hugetlbfs-in-PV-guests.patch | 72 ++
.../x86/x86-standardize-mmap_rnd-usage.patch | 99 +++
.../debian/migrate-fix-abi-change-in-3.16.36.patch | 20 +
debian/patches/series | 70 ++
73 files changed, 7096 insertions(+)
diff --cc debian/changelog
index c6007e1,b51f2c8..37e5a6a
--- a/debian/changelog
+++ b/debian/changelog
@@@ -1,15 -1,112 +1,136 @@@
++linux (3.16.7-ckt25-2+deb8u3~bpo70+1) wheezy-backports; urgency=medium
++
++ * Rebuild for wheezy:
++ - Disable architectures that weren't part of wheezy
++ - Use gcc-4.6 for all architectures
++ - Change ABI number to 0.bpo.4
++ - [arm] btrfs: Work around bug in gcc-4.6 (fixes FTBFS)
++ - linux-image: Depend on initramfs-tools without any alternatives, so
++ that neither apt nor aptitude will automatically switch to dracut
++
++ -- Ben Hutchings <ben at decadent.org.uk> Thu, 07 Jul 2016 11:29:27 +0200
++
+ linux (3.16.7-ckt25-2+deb8u3) jessie-security; urgency=high
+
+ [ Salvatore Bonaccorso ]
+ * Revert "netfilter: ensure number of counters is >0 in do_replace()"
+ Fixes regression introduced in 3.16.7-ckt25-2+deb8u2. Setting rules with
+ ebtables did not work any more.
+ Thanks to Jacob Lundberg <jacob at collegenet.com> (Closes: #828914)
+
+ [ Ben Hutchings ]
+ * ALSA: compress: fix an integer overflow check (CVE-2014-9904)
+ * [amd64] misc: mic: Fix for double fetch security bug in VOP driver
+ (CVE-2016-5728)
+ * [powerpc*] tm: Always reclaim in start_thread() for exec() class syscalls
+ (CVE-2016-5828)
+ * HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands
+ (CVE-2016-5829)
+ * [s390*] sclp_ctl: fix potential information leak with /dev/sclp
+ (CVE-2016-6130)
+
+ -- Salvatore Bonaccorso <carnil at debian.org> Sat, 02 Jul 2016 13:30:12 +0200
+
+ linux (3.16.7-ckt25-2+deb8u2) jessie-security; urgency=high
+
+ * Fix backport of "netfilter: x_tables: validate targets of jumps"
+ * netfilter: ensure number of counters is >0 in do_replace()
+
+ -- Ben Hutchings <ben at decadent.org.uk> Sat, 25 Jun 2016 23:36:47 +0200
+
+ linux (3.16.7-ckt25-2+deb8u1) jessie-security; urgency=high
+
+ [ Ben Hutchings ]
+ * include/linux/poison.h: fix LIST_POISON{1,2} offset (CVE-2016-0821)
+ * [s390*] mm: four page table levels vs. fork (CVE-2016-2143)
+ * [amd64] iopl: Properly context-switch IOPL on Xen PV (CVE-2016-3157)
+ * [amd64] entry/compat: Add missing CLAC to entry_INT80_32
+ * netfilter: x_tables: Fix parsing of IPT_SO_SET_REPLACE blobs
+ (CVE-2016-3134, CVE-2016-4997, CVE-2016-4998)
+ - validate e->target_offset early
+ - make sure e->next_offset covers remaining blob size
+ - fix unconditional helper
+ - don't move to non-existent next rule
+ - validate targets of jumps
+ - add and use xt_check_entry_offsets
+ - kill check_entry helper
+ - assert minimum target size
+ - add compat version of xt_check_entry_offsets
+ - check standard target size too
+ - check for bogus target offset
+ - validate all offsets and sizes in a rule
+ - don't reject valid target size on some
+ - arp_tables: simplify translate_compat_table args
+ - ip_tables: simplify translate_compat_table args
+ - ip6_tables: simplify translate_compat_table args
+ - xt_compat_match_from_user doesn't need a retval
+ - do compat validation via translate_table
+ - introduce and use xt_copy_counters_from_user
+ * Ignore ABI change in x_tables
+ * ipv4: Don't do expensive useless work during inetdev destroy.
+ (CVE-2016-3156)
+ * [x86] standardize mmap_rnd() usage
+ * [x86] mm/32: Enable full randomization on i386 and X86_32 (CVE-2016-3672)
+ * usbnet: Fix possible memory corruption after probe failure (CVE-2016-3951)
+ - cdc_ncm: do not call usbnet_link_change from cdc_ncm_bind
+ - usbnet: cleanup after bind() in probe()
+ * atl2: Disable unimplemented scatter/gather feature (CVE-2016-2117)
+ * mm: hugetlb: allow hugepages_supported to be architecture specific
+ * ecryptfs: fix handling of directory opening
+ * ecryptfs: forbid opening files without mmap handler (CVE-2016-1583)
+ * Input: aiptek - fix crash on detecting device without endpoints
+ (CVE-2015-7515)
+ * ALSA: usb-audio: Fix NULL dereference in create_fixed_stream_quirk()
+ (CVE-2016-2184)
+ * ALSA: usb-audio: Add sanity checks for endpoint accesses
+ * Input: ati_remote2 - fix crashes on detecting device with invalid
+ descriptor (CVE-2016-2185)
+ * Input: powermate - fix oops with malicious USB descriptors (CVE-2016-2186)
+ * Input: gtco - fix crash on detecting device without endpoints
+ (CVE-2016-2187)
+ * USB: mct_u232: add sanity checking in probe (CVE-2016-3136)
+ * USB: cypress_m8: add endpoint sanity check (CVE-2016-3137)
+ * USB: cdc-acm: more sanity checking (CVE-2016-3138)
+ * USB: digi_acceleport: do sanity checking for the number of ports
+ (CVE-2016-3140)
+ * mm: migrate dirty page without clear_page_dirty_for_io etc (CVE-2016-3070)
+ * migrate: Fix ABI change
+ * net: fix infoleak in llc (CVE-2016-4485)
+ * net: fix infoleak in rtnetlink (CVE-2016-4486)
+ * net: fix a kernel infoleak in x25 module (CVE-2016-4580)
+ * IB/security: Restrict use of the write() interface (CVE-2016-4565)
+ * ppp: take reference on channels netns (CVE-2016-4805)
+ * KEYS: potential uninitialized variable (CVE-2016-4470)
+
+ [ Salvatore Bonaccorso ]
+ * [x86] USB: usbip: fix potential out-of-bounds write (CVE-2016-3955)
+ * [x86] xen: suppress hugetlbfs in PV guests (CVE-2016-3961)
+ * get_rock_ridge_filename(): handle malformed NM entries (CVE-2016-4913)
+ * fs/pnode.c: treat zero mnt_group_id-s as unequal
+ * propogate_mnt: Handle the first propogated copy being a slave
+ (CVE-2016-4581)
+ * USB: usbfs: fix potential infoleak in devio (CVE-2016-4482)
+ * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (CVE-2016-4569)
+ * ALSA: timer: Fix leak in events via snd_timer_user_ccallback or
+ snd_timer_user_tinterrupt (CVE-2016-4578)
+ * tipc: fix an infoleak in tipc_node_get_links (CVE-2016-5243)
+ * rds: fix an infoleak in rds_inc_info_copy (CVE-2016-5244)
+ * nfsd: check permissions when setting ACLs (CVE-2016-1237)
+
+ -- Ben Hutchings <ben at decadent.org.uk> Sat, 25 Jun 2016 12:47:15 +0200
+
+linux (3.16.7-ckt25-2~bpo70+1) wheezy-backports; urgency=medium
+
+ * Rebuild for wheezy:
+ - Disable architectures that weren't part of wheezy
+ - Use gcc-4.6 for all architectures
+ - Change ABI number to 0.bpo.4
+ - [arm] btrfs: Work around bug in gcc-4.6 (fixes FTBFS)
+ - linux-image: Depend on initramfs-tools without any alternatives, so
+ that neither apt nor aptitude will automatically switch to dracut
+
+ -- Ben Hutchings <ben at decadent.org.uk> Wed, 13 Apr 2016 00:39:02 +0100
+
linux (3.16.7-ckt25-2) jessie; urgency=medium
* Revert "drm/radeon: hold reference to fences in radeon_sa_bo_new"
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git
More information about the Kernel-svn-changes
mailing list