diff options
author | Alexandre Oliva <lxoliva@fsfla.org> | 2014-10-13 17:23:24 +0000 |
---|---|---|
committer | Alexandre Oliva <lxoliva@fsfla.org> | 2014-10-13 17:23:24 +0000 |
commit | a57062a9cbc22a7ba6e54ef1de09c86eacd5d74e (patch) | |
tree | d90722efa39bf43f8643a4ca8c5c465abc7163bd /freed-ora/current | |
parent | 981d6750aafe0108b3c184dd2a202e3ce926c18e (diff) | |
download | linux-libre-raptor-a57062a9cbc22a7ba6e54ef1de09c86eacd5d74e.tar.gz linux-libre-raptor-a57062a9cbc22a7ba6e54ef1de09c86eacd5d74e.zip |
3.14.21-100.fc19.gnu
Diffstat (limited to 'freed-ora/current')
5 files changed, 15 insertions, 107 deletions
diff --git a/freed-ora/current/f19/kernel.spec b/freed-ora/current/f19/kernel.spec index 123eb73cb..450942aeb 100644 --- a/freed-ora/current/f19/kernel.spec +++ b/freed-ora/current/f19/kernel.spec @@ -112,7 +112,7 @@ Summary: The Linux kernel %if 0%{?released_kernel} # Do we have a -stable update to apply? -%define stable_update 20 +%define stable_update 21 # Is it a -stable RC? %define stable_rc 0 # Set rpm version accordingly @@ -816,9 +816,6 @@ Patch25109: revert-input-wacom-testing-result-shows-get_report-is-unnecessary.pa Patch25110: 0001-ideapad-laptop-Blacklist-rfkill-control-on-the-Lenov.patch Patch25111: 0002-ideapad-laptop-Change-Lenovo-Yoga-2-series-rfkill-ha.patch -#CVE-2014-6410 rhbz 1141809 1141810 -Patch26026: udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch - # END OF PATCH DEFINITIONS %endif @@ -1577,9 +1574,6 @@ ApplyPatch revert-input-wacom-testing-result-shows-get_report-is-unnecessary.pat ApplyPatch 0001-ideapad-laptop-Blacklist-rfkill-control-on-the-Lenov.patch ApplyPatch 0002-ideapad-laptop-Change-Lenovo-Yoga-2-series-rfkill-ha.patch -#CVE-2014-6410 rhbz 1141809 1141810 -ApplyPatch udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch - # END OF PATCH APPLICATIONS %endif @@ -2403,6 +2397,12 @@ fi # and build. %changelog +* Sat Oct 11 2014 Alexandre Oliva <lxoliva@fsfla.org> -libre +- GNU Linux-libre 3.14.21-gnu. + +* Thu Oct 09 2014 Justin M. Forbes <jforbes@fedoraproject.org> - 3.14.21-100 +- Linux v3.14.21 + * Mon Oct 6 2014 Alexandre Oliva <lxoliva@fsfla.org> -libre - GNU Linux-libre 3.14.20-gnu. diff --git a/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign b/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign deleted file mode 100644 index 90ad49930..000000000 --- a/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign +++ /dev/null @@ -1,7 +0,0 @@ ------BEGIN PGP SIGNATURE----- -Version: GnuPG v2 - -iEYEABECAAYFAlQzbL8ACgkQvLfPh359R6ecMwCfcOJQJEzEiROJJhxki+M+liS+ -cR8AoIXkmrS08zka8DuJmJhNoT/dxO6d -=CIUA ------END PGP SIGNATURE----- diff --git a/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign b/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign new file mode 100644 index 000000000..eae3902a2 --- /dev/null +++ b/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign @@ -0,0 +1,7 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2 + +iEYEABECAAYFAlQ3T30ACgkQvLfPh359R6dK0QCfXAqoyRPuGWpqL+5zMj4Y02YC +2HAAn2TF62GBT0NXXGRhQY1c5yf4iJiy +=H1GE +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/f19/sources b/freed-ora/current/f19/sources index 49706df50..3b3517aea 100644 --- a/freed-ora/current/f19/sources +++ b/freed-ora/current/f19/sources @@ -1,2 +1,2 @@ c108ec52eeb2a9b9ddbb8d12496ff25f linux-libre-3.14-gnu.tar.xz -8a8733b7bc6ad5ca2106a266a77499b2 patch-3.14-gnu-3.14.20-gnu.xz +fcd9a5665fb3fcec38abea5e366f4427 patch-3.14-gnu-3.14.21-gnu.xz diff --git a/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch b/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch deleted file mode 100644 index a8839661b..000000000 --- a/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch +++ /dev/null @@ -1,92 +0,0 @@ -From a45318b5ff8c505afcbf04a1c5fa7dbe426d9588 Mon Sep 17 00:00:00 2001 -From: Jan Kara <jack@suse.cz> -Date: Thu, 4 Sep 2014 14:06:55 +0200 -Subject: [PATCH] udf: Avoid infinite loop when processing indirect ICBs - -We did not implement any bound on number of indirect ICBs we follow when -loading inode. Thus corrupted medium could cause kernel to go into an -infinite loop, possibly causing a stack overflow. - -Fix the possible stack overflow by removing recursion from -__udf_read_inode() and limit number of indirect ICBs we follow to avoid -infinite loops. - -Bugzilla: 1141810 -Upstream-status: 3.17 - -Signed-off-by: Jan Kara <jack@suse.cz> ---- - fs/udf/inode.c | 35 +++++++++++++++++++++-------------- - 1 file changed, 21 insertions(+), 14 deletions(-) - -diff --git a/fs/udf/inode.c b/fs/udf/inode.c -index 236cd48184c2..a932f7740b51 100644 ---- a/fs/udf/inode.c -+++ b/fs/udf/inode.c -@@ -1271,13 +1271,22 @@ update_time: - return 0; - } - -+/* -+ * Maximum length of linked list formed by ICB hierarchy. The chosen number is -+ * arbitrary - just that we hopefully don't limit any real use of rewritten -+ * inode on write-once media but avoid looping for too long on corrupted media. -+ */ -+#define UDF_MAX_ICB_NESTING 1024 -+ - static void __udf_read_inode(struct inode *inode) - { - struct buffer_head *bh = NULL; - struct fileEntry *fe; - uint16_t ident; - struct udf_inode_info *iinfo = UDF_I(inode); -+ unsigned int indirections = 0; - -+reread: - /* - * Set defaults, but the inode is still incomplete! - * Note: get_new_inode() sets the following on a new inode: -@@ -1314,28 +1323,26 @@ static void __udf_read_inode(struct inode *inode) - ibh = udf_read_ptagged(inode->i_sb, &iinfo->i_location, 1, - &ident); - if (ident == TAG_IDENT_IE && ibh) { -- struct buffer_head *nbh = NULL; - struct kernel_lb_addr loc; - struct indirectEntry *ie; - - ie = (struct indirectEntry *)ibh->b_data; - loc = lelb_to_cpu(ie->indirectICB.extLocation); - -- if (ie->indirectICB.extLength && -- (nbh = udf_read_ptagged(inode->i_sb, &loc, 0, -- &ident))) { -- if (ident == TAG_IDENT_FE || -- ident == TAG_IDENT_EFE) { -- memcpy(&iinfo->i_location, -- &loc, -- sizeof(struct kernel_lb_addr)); -- brelse(bh); -- brelse(ibh); -- brelse(nbh); -- __udf_read_inode(inode); -+ if (ie->indirectICB.extLength) { -+ brelse(bh); -+ brelse(ibh); -+ memcpy(&iinfo->i_location, &loc, -+ sizeof(struct kernel_lb_addr)); -+ if (++indirections > UDF_MAX_ICB_NESTING) { -+ udf_err(inode->i_sb, -+ "too many ICBs in ICB hierarchy" -+ " (max %d supported)\n", -+ UDF_MAX_ICB_NESTING); -+ make_bad_inode(inode); - return; - } -- brelse(nbh); -+ goto reread; - } - } - brelse(ibh); --- -2.1.0 - |