[linux] branch jessie updated (ae3e344 -> 8f2c169)
debian-kernel at lists.debian.org
debian-kernel at lists.debian.org
Thu Aug 31 21:24:54 UTC 2017
This is an automated email from the git hooks/post-receive script.
benh pushed a change to branch jessie
in repository linux.
from ae3e344 mm/huge_memory.c: fix up "mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp" backport
adds 63190c2 Add various security fixes
adds 5bfcb79 ipv6: Check ip6_find_1stfragopt() return value properly.
adds 3e771a1 Add follow-up fixes for CVE-2017-9074
adds af5f37d mm: enlarge stack guard gap (CVE-2017-1000364)
adds 76d0367 mm: allow to configure stack gap size
adds 221e24c mm, proc: cap the stack gap for unpopulated growing vmas
adds 909faf0 mm: do not collapse stack gap into THP
adds 12c9735 fold me "mm: allow to configure stack gap size"
adds 44412f2 Prepare to release linux (3.16.43-2+deb8u1).
adds d6dd962 Update fix for CVE-2017-1000364 (Closes: #865303)
adds 5100d3f regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing (CVE-2014-9940)
adds 5115e83 [x86] drm/vmwgfx: limit the number of mip levels in vmw_gb_surface_define_ioctl() (CVE-2017-7346)
adds 8a86ffc rxrpc: Fix several cases where a padded len isn't checked in ticket decode (CVE-2017-7482)
adds bf419af brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx() (CVE-2017-7541)
adds 04ae6a3 ipv6: avoid overflow of offset in ip6_find_1stfragopt (CVE-2017-7542)
adds d06d090 [x86] mm: Tighten x86 /dev/mem with zeroing reads (CVE-2017-7889)
adds 066bfdf [x86] drm/vmwgfx: Make sure backup_handle is always valid (CVE-2017-9605)
adds f95e900 xen-blkback: don't leak stack data via response ring (CVE-2017-10911)
adds 88a396d mqueue: fix a use-after-free in sys_mq_notify() (CVE-2017-11176)
adds 4a57f5b char: lp: fix possible integer overflow in lp_setup() (CVE-2017-1000363)
adds dea1bd7 fs/exec.c: account for argv/envp pointers (CVE-2017-1000365)
adds 6dba271 dentry name snapshots (CVE-2017-7533)
adds 68212b6 Prepare to release linux (3.16.43-2+deb8u3).
adds 3a479ee [x86] KVM: fix singlestepping over syscall (CVE-2017-7518)
adds 455ebcd binfmt_elf: use ELF_ET_DYN_BASE only for PIE (CVE-2017-1000370, CVE-2017-1000371)
adds 3e4365b Add fixes for CVE-2017-1000380
adds f49b53d timerfd: Protect the might cancel mechanism proper (CVE-2017-10661)
adds 716347b xfrm: policy: check policy direction value (CVE-2017-11600)
adds 7e94710 packet: fix tp_reserve race in packet_set_ring (CVE-2017-1000111)
adds aa6bff8 udp: consistently apply ufo or fragmentation (CVE-2017-1000112)
adds 7cfb28c Fix backport of "udp: consistently apply ufo or fragmentation"
new 8f2c169 Update to 3.16.47
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
debian/changelog | 497 +++++++++++++++++++++
debian/config/defines | 6 +
...x-possible-buffer-overflow-in-brcmf_cfg80.patch | 42 ++
...ash-fix-einprogress-notification-callback.patch | 226 ----------
...x-fencepost-in-s_first_meta_bg-validation.patch | 30 --
.../all/ipv6-fix-leak-in-ipv6_gso_segment.patch | 30 ++
...andle-errors-reported-by-xfrm6_find_1stfr.patch | 40 ++
...ow-keyrings-beginning-with-.-to-be-joined.patch | 76 ----
...yctl_set_reqkey_keyring-to-not-leak-threa.patch | 174 --------
...ate-eperm-for-a-key-type-name-beginning-w.patch | 41 --
...special-dot-prefixed-keyring-name-bug-fix.patch | 50 ---
...ory.c-fix-up-mm-huge_memory.c-respect-fol.patch | 59 ---
...y.c-fix-error-handling-in-set_mempolicy-a.patch | 72 ---
...-fix-overflow-in-check-for-priv-area-size.patch | 35 --
...ket-fix-overflow-in-check-for-tp_frame_nr.patch | 32 --
...cket-fix-overflow-in-check-for-tp_reserve.patch | 28 --
...nfmt_elf-use-elf_et_dyn_base-only-for-pie.patch | 167 +++++++
.../bugfix/all/ping-implement-proper-locking.patch | 49 --
.../usb-iowarrior-fix-null-deref-at-probe.patch | 52 ---
.../xfrm-policy-check-policy-direction-value.patch | 40 ++
...e-xfrm_msg_newae-incoming-esn-size-harder.patch | 34 --
..._newae-xfrma_replay_esn_val-replay_window.patch | 45 --
...eger-overflow-in-vmw_surface_define_ioctl.patch | 35 --
...r-dereference-in-vmw_surface_define_ioctl.patch | 34 --
...ror-count-medium-access-timeout-only-once.patch | 121 +++++
...ge-for-ttm_ref_object_add-require_existed.patch | 41 ++
debian/patches/series | 24 +-
27 files changed, 991 insertions(+), 1089 deletions(-)
create mode 100644 debian/patches/bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch
delete mode 100644 debian/patches/bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch
delete mode 100644 debian/patches/bugfix/all/ext4-fix-fencepost-in-s_first_meta_bg-validation.patch
create mode 100644 debian/patches/bugfix/all/ipv6-fix-leak-in-ipv6_gso_segment.patch
create mode 100644 debian/patches/bugfix/all/ipv6-xfrm-handle-errors-reported-by-xfrm6_find_1stfr.patch
delete mode 100644 debian/patches/bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch
delete mode 100644 debian/patches/bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch
delete mode 100644 debian/patches/bugfix/all/keys-reinstate-eperm-for-a-key-type-name-beginning-w.patch
delete mode 100644 debian/patches/bugfix/all/keys-special-dot-prefixed-keyring-name-bug-fix.patch
delete mode 100644 debian/patches/bugfix/all/mm-huge_memory.c-fix-up-mm-huge_memory.c-respect-fol.patch
delete mode 100644 debian/patches/bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch
delete mode 100644 debian/patches/bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch
delete mode 100644 debian/patches/bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch
delete mode 100644 debian/patches/bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch
create mode 100644 debian/patches/bugfix/all/pie-aslr/binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch
delete mode 100644 debian/patches/bugfix/all/ping-implement-proper-locking.patch
delete mode 100644 debian/patches/bugfix/all/usb-iowarrior-fix-null-deref-at-probe.patch
create mode 100644 debian/patches/bugfix/all/xfrm-policy-check-policy-direction-value.patch
delete mode 100644 debian/patches/bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch
delete mode 100644 debian/patches/bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch
delete mode 100644 debian/patches/bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch
delete mode 100644 debian/patches/bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch
create mode 100644 debian/patches/debian/revert-scsi-scsi_error-count-medium-access-timeout-only-once.patch
create mode 100644 debian/patches/debian/ttm-avoid-abi-change-for-ttm_ref_object_add-require_existed.patch
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git
More information about the Kernel-svn-changes
mailing list