All of lore.kernel.org
 help / color / mirror / Atom feed
* [4.9] Security fixes
@ 2019-05-30 11:52 Ben Hutchings
  2019-05-30 12:05 ` Greg Kroah-Hartman
  2019-06-04 14:45 ` Greg Kroah-Hartman
  0 siblings, 2 replies; 3+ messages in thread
From: Ben Hutchings @ 2019-05-30 11:52 UTC (permalink / raw)
  To: Greg Kroah-Hartman, Sasha Levin; +Cc: stable

[-- Attachment #1: Type: text/plain, Size: 1053 bytes --]

I've attached the following fixes to 4.9, as an mbox:

- brcmfmac: add length checks in scheduled scan result handler
- brcmfmac: assure SSID length from firmware is limited
- brcmfmac: add subtype check for event handling in data path
- binder: Replace "%p" with "%pK" for stable
- binder: replace "%p" with "%pK"
- fs: prevent page refcount overflow in pipe_buf_get
- mm, gup: remove broken VM_BUG_ON_PAGE compound check for hugepages
- mm, gup: ensure real head page is ref-counted when using hugepages
- mm: prevent get_user_pages() from overflowing page refcount
- mm: make page ref count overflow check tighter and more explicit
- coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping

The first two "mm, gup" commits might not be strictly security fixes
but the next one depends on them.

Ben.

-- 
Ben Hutchings, Software Developer                         Codethink Ltd
https://www.codethink.co.uk/                 Dale House, 35 Dale Street
                                     Manchester, M1 2HF, United Kingdom

[-- Attachment #2: security-4.9.mbox --]
[-- Type: application/mbox, Size: 48001 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [4.9] Security fixes
  2019-05-30 11:52 [4.9] Security fixes Ben Hutchings
@ 2019-05-30 12:05 ` Greg Kroah-Hartman
  2019-06-04 14:45 ` Greg Kroah-Hartman
  1 sibling, 0 replies; 3+ messages in thread
From: Greg Kroah-Hartman @ 2019-05-30 12:05 UTC (permalink / raw)
  To: Ben Hutchings; +Cc: Sasha Levin, stable

On Thu, May 30, 2019 at 12:52:37PM +0100, Ben Hutchings wrote:
> I've attached the following fixes to 4.9, as an mbox:
> 
> - brcmfmac: add length checks in scheduled scan result handler
> - brcmfmac: assure SSID length from firmware is limited
> - brcmfmac: add subtype check for event handling in data path
> - binder: Replace "%p" with "%pK" for stable
> - binder: replace "%p" with "%pK"
> - fs: prevent page refcount overflow in pipe_buf_get
> - mm, gup: remove broken VM_BUG_ON_PAGE compound check for hugepages
> - mm, gup: ensure real head page is ref-counted when using hugepages
> - mm: prevent get_user_pages() from overflowing page refcount
> - mm: make page ref count overflow check tighter and more explicit
> - coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
> 
> The first two "mm, gup" commits might not be strictly security fixes
> but the next one depends on them.

Thanks for these, I'll queue them up after the current kernels out for
-rc is released.

greg k-h

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [4.9] Security fixes
  2019-05-30 11:52 [4.9] Security fixes Ben Hutchings
  2019-05-30 12:05 ` Greg Kroah-Hartman
@ 2019-06-04 14:45 ` Greg Kroah-Hartman
  1 sibling, 0 replies; 3+ messages in thread
From: Greg Kroah-Hartman @ 2019-06-04 14:45 UTC (permalink / raw)
  To: Ben Hutchings; +Cc: Sasha Levin, stable

On Thu, May 30, 2019 at 12:52:37PM +0100, Ben Hutchings wrote:
> I've attached the following fixes to 4.9, as an mbox:
> 
> - brcmfmac: add length checks in scheduled scan result handler
> - brcmfmac: assure SSID length from firmware is limited
> - brcmfmac: add subtype check for event handling in data path
> - binder: Replace "%p" with "%pK" for stable
> - binder: replace "%p" with "%pK"
> - fs: prevent page refcount overflow in pipe_buf_get
> - mm, gup: remove broken VM_BUG_ON_PAGE compound check for hugepages
> - mm, gup: ensure real head page is ref-counted when using hugepages
> - mm: prevent get_user_pages() from overflowing page refcount
> - mm: make page ref count overflow check tighter and more explicit
> - coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
> 
> The first two "mm, gup" commits might not be strictly security fixes
> but the next one depends on them.

All now queued up, thanks!

greg k-h

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-06-04 14:46 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-05-30 11:52 [4.9] Security fixes Ben Hutchings
2019-05-30 12:05 ` Greg Kroah-Hartman
2019-06-04 14:45 ` Greg Kroah-Hartman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.