[linux] 20/29: cleanup changelog entries for 4.9.77

debian-kernel at lists.debian.org debian-kernel at lists.debian.org
Tue Jan 23 17:14:07 UTC 2018


This is an automated email from the git hooks/post-receive script.

corsac pushed a commit to branch stretch
in repository linux.

commit 90d173df9b249fbd4f3b67217564fafc6ba12fed
Author: Yves-Alexis Perez <corsac at debian.org>
Date:   Thu Jan 18 11:37:53 2018 +0100

    cleanup changelog entries for 4.9.77
---
 debian/changelog | 108 ++++++++++++-------------------------------------------
 1 file changed, 23 insertions(+), 85 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index ff58873..93ab3ae 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -727,104 +727,42 @@ linux (4.9.77-1) UNRELEASED; urgency=medium
     - [hppa] parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel
     - [x86] Map the vsyscall page with _PAGE_USER
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.77
-    - dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
     - mac80211: Add RX flag to indicate ICV stripped
     - ath10k: rebuild crypto header in rx data frames
-    - KVM: Fix stack-out-of-bounds read in write_mmio
-    - can: gs_usb: fix return value of the "set_bittiming" callback
-    - IB/srpt: Disable RDMA access by the initiator
-    - MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task
-    - MIPS: Factor out NT_PRFPREG regset access helpers
-    - MIPS: Guard against any partial write attempt with PTRACE_SETREGSET
-    - MIPS: Consistently handle buffer counter with PTRACE_SETREGSET
-    - MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
-    - MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET
-    - MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses
-    - kvm: vmx: Scrub hardware GPRs at VM-exit
-    - platform/x86: wmi: Call acpi_wmi_init() later
-    - x86/acpi: Handle SCI interrupts above legacy space gracefully
+    - [x86] KVM: Fix stack-out-of-bounds read in write_mmio
+    - [mips] MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
+    - [x86] kvm: vmx: Scrub hardware GPRs at VM-exit (mitigates Spectre /
+      CVE-2017-5715 and CVE-2017-5753)
     - ALSA: pcm: Remove incorrect snd_BUG_ON() usages
-    - ALSA: pcm: Add missing error checks in OSS emulation plugin builder
-    - ALSA: pcm: Abort properly at pending signal in OSS read/write loops
-    - ALSA: pcm: Allow aborting mutex lock at OSS read/write loops
-    - ALSA: aloop: Release cable upon open error path
-    - ALSA: aloop: Fix inconsistent format due to incomplete rule
-    - ALSA: aloop: Fix racy hw constraints adjustment
-    - x86/acpi: Reduce code duplication in mp_override_legacy_irq()
-    - zswap: don't param_set_charp while holding spinlock
-    - lan78xx: use skb_cow_head() to deal with cloned skbs
-    - sr9700: use skb_cow_head() to deal with cloned skbs
-    - smsc75xx: use skb_cow_head() to deal with cloned skbs
-    - cx82310_eth: use skb_cow_head() to deal with cloned skbs
-    - xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
-    - 8021q: fix a memory leak for VLAN 0 device
-    - ip6_tunnel: disable dst caching if tunnel is dual-stack
-    - net: core: fix module type in sock_diag_bind
     - RDS: Heap OOB write in rds_message_alloc_sgs()
     - RDS: null pointer dereference in rds_atomic_free_op
-    - sh_eth: fix TSU resource handling
-    - sh_eth: fix SH7757 GEther initialization
-    - net: stmmac: enable EEE in MII, GMII or RGMII only
     - ipv6: fix possible mem leaks in ipv6_make_skb()
-    - ethtool: do not print warning for applications using legacy API
     - mlxsw: spectrum_router: Fix NULL pointer deref
-    - net/sched: Fix update of lastuse in act modules implementing stats_update
     - crypto: algapi - fix NULL dereference in crypto_remove_spawns()
-    - rbd: set max_segments to USHRT_MAX
-    - x86/microcode/intel: Extend BDW late-loading with a revision check
-    - KVM: x86: Add memory barrier on vmcs field lookup
-    - drm/vmwgfx: Potential off by one in vmw_view_add()
-    - kaiser: Set _PAGE_NX only if supported
-    - iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
-    - target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
-    - bpf: move fixup_bpf_calls() function
-    - bpf: refactor fixup_bpf_calls()
-    - bpf: prevent out-of-bounds speculation
+    - [x86] x86/microcode/intel: Extend BDW late-loading with a revision check
+    - [x86] KVM: x86: Add memory barrier on vmcs field lookup (mitigates
+      Spectre#2 / CVE-2017-5715)
+    - [x86] kaiser: Set _PAGE_NX only if supported
+    - bpf: prevent out-of-bounds speculation (mitigates Spectre#1 /
+      CVE-2017-5753)
     - bpf, array: fix overflow in max_entries and undefined behavior in index_mask
-    - USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
-    - USB: serial: cp210x: add new device ID ELV ALC 8xxx
-    - usb: misc: usb3503: make sure reset is low for at least 100us
     - USB: fix usbmon BUG trigger
     - usbip: remove kernel addresses from usb device and urb debug msgs
     - usbip: fix vudc_rx: harden CMD_SUBMIT path to handle malicious input
     - usbip: vudc_tx: fix v_send_ret_submit() vulnerability to null xfer buffer
-    - staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
-    - Bluetooth: Prevent stack info leak from the EFS element.
-    - uas: ignore UAS for Norelsys NS1068(X) chips
-    - e1000e: Fix e1000_check_for_copper_link_ich8lan return value.
-    - x86/Documentation: Add PTI description
-    - x86/cpu: Factor out application of forced CPU caps
-    - x86/cpufeatures: Make CPU bugs sticky
-    - x86/cpufeatures: Add X86_BUG_CPU_INSECURE
-    - x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN
-    - x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
-    - x86/cpu: Merge bugs.c and bugs_64.c
-    - sysfs/cpu: Add vulnerability folder
-    - x86/cpu: Implement CPU vulnerabilites sysfs functions
-    - x86/cpu/AMD: Make LFENCE a serializing instruction
-    - x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC
-    - sysfs/cpu: Fix typos in vulnerability documentation
-    - x86/alternatives: Fix optimize_nops() checking
-    - x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
-    - x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
-    - objtool, modules: Discard objtool annotation sections for modules
-    - objtool: Detect jumps to retpoline thunks
-    - objtool: Allow alternatives to be ignored
-    - x86/asm: Use register variable to get stack pointer value
-    - x86/retpoline: Add initial retpoline support
-    - x86/spectre: Add boot time option to select Spectre v2 mitigation
-    - x86/retpoline/crypto: Convert crypto assembler indirect jumps
-    - x86/retpoline/entry: Convert entry assembler indirect jumps
-    - x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
-    - x86/retpoline/hyperv: Convert assembler indirect jumps
-    - x86/retpoline/xen: Convert Xen hypercall indirect jumps
-    - x86/retpoline/checksum32: Convert assembler indirect jumps
-    - x86/retpoline/irq32: Convert assembler indirect jumps
-    - x86/retpoline: Fill return stack buffer on vmexit
-    - selftests/x86: Add test_vsyscall
-    - x86/retpoline: Remove compile time warning
-    - objtool: Fix retpoline support for pre-ORC objtool
-    - x86/pti/efi: broken conversion from efi to kernel page table
+    - Bluetooth: Prevent stack info leak from the EFS element.(CVE-2017-1000410)
+    - [x86] x86/retpoline: Add initial retpoline support (mitigates Spectre#2 /
+      CVE-2017-5715)
+    - [x86] x86/spectre: Add boot time option to select Spectre v2 mitigation
+    - [x86] x86/retpoline/crypto: Convert crypto assembler indirect jumps
+    - [x86] x86/retpoline/entry: Convert entry assembler indirect jumps
+    - [x86] x86/retpoline/ftrace: Convert ftrace assembler indirect jumps
+    - [x86] x86/retpoline/hyperv: Convert assembler indirect jumps
+    - [x86] x86/retpoline/xen: Convert Xen hypercall indirect jumps
+    - [x86] x86/retpoline/checksum32: Convert assembler indirect jumps
+    - [x86] x86/retpoline/irq32: Convert assembler indirect jumps
+    - [x86] x86/retpoline: Fill return stack buffer on vmexit
+    - [x86] x86/pti/efi: broken conversion from efi to kernel page table
 
   [ Ben Hutchings ]
   * [rt] Update to 4.9.68-rt60:

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/kernel/linux.git



More information about the Kernel-svn-changes mailing list