[linux] annotated tag debian/3.16.7-ckt25-2+deb8u1 created (now c1db2dd)
debian-kernel at lists.debian.org
debian-kernel at lists.debian.org
Sat Jun 25 18:52:42 UTC 2016
This is an automated email from the git hooks/post-receive script.
carnil pushed a change to annotated tag debian/3.16.7-ckt25-2+deb8u1
in repository linux.
at c1db2dd (tag)
tagging d82dcef0244076f2525872fffbcfb4de914aa9b8 (commit)
replaces debian/3.16.7-ckt25-2
tagged by Salvatore Bonaccorso
on Sat Jun 25 13:40:16 2016 +0200
- Log -----------------------------------------------------------------
Release linux (3.16.7-ckt25-2+deb8u1).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=OlQm
-----END PGP SIGNATURE-----
Ben Hutchings (23):
Add various security fixes
Merge tag 'debian/3.16.7-ckt25-1' into jessie-security
Revert recent radeon revisions raising regressions
Revert "usb: hub: do not clear BOS field during reset device" (Closes: #820176)
Merge tag 'debian/3.16.7-ckt25-2' into jessie-security
netfilter: x_tables: Fix parsing of IPT_SO_SET_REPLACE blobs (CVE-2016-3134)
ipv4: Don't do expensive useless work during inetdev destroy. (CVE-2016-3156)
Add fix for CVE-2016-3672
usbnet: Fix possible memory corruption after probe failure (CVE-2016-3951)
atl2: Disable unimplemented scatter/gather feature (CVE-2016-2117)
Delete dummy CVE ID from 'missing CLAC' fix
mm: hugetlb: allow hugepages_supported to be architecture specific
ecryptfs: forbid opening files without mmap handler (CVE-2016-1583)
Add USB descriptor parsing fixes
mm: migrate dirty page without clear_page_dirty_for_io etc (CVE-2016-3070)
Add networking information leak fixes
IB/security: Restrict use of the write() interface (CVE-2016-4565)
ppp: take reference on channels netns (CVE-2016-4805)
KEYS: potential uninitialized variable (CVE-2016-4470)
netfilter: x_tables: Add fixes for CVE-2016-4997, CVE-2016-4998
Ignore ABI change in x_tables
migrate: Fix ABI change
Prepare to release linux (3.16.7-ckt25-2+deb8u1).
Salvatore Bonaccorso (15):
Add CVE reference for "AIO: properly check iovec sizes"
CVE-2016-2847 assigned separately
Replace retroactive changes to CVE ID references with [bracketed notes]
[x86] USB: usbip: fix potential out-of-bounds write (CVE-2016-3955)
[x86] xen: suppress hugetlbfs in PV guests (CVE-2016-3961)
get_rock_ridge_filename(): handle malformed NM entries (CVE-2016-4913)
fs/pnode.c: treat zero mnt_group_id-s as unequal
propogate_mnt: Handle the first propogated copy being a slave (CVE-2016-4581)
USB: usbfs: fix potential infoleak in devio (CVE-2016-4482)
ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS (CVE-2016-4569)
ALSA: timer: Fix leak in events via snd_timer_user_ccallback or snd_timer_user_tinterrupt (CVE-2016-4578)
tipc: fix an infoleak in tipc_nl_compat_link_dump (CVE-2016-5243)
Fix changelog entry for CVE-2016-5243
rds: fix an infoleak in rds_inc_info_copy (CVE-2016-5244)
nfsd: check permissions when setting ACLs (CVE-2016-1237)
-----------------------------------------------------------------------
No new revisions were added by this update.
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git
More information about the Kernel-svn-changes
mailing list