summaryrefslogtreecommitdiffstats
path: root/freed-ora/current
diff options
context:
space:
mode:
authorAlexandre Oliva <lxoliva@fsfla.org>2014-10-13 17:23:24 +0000
committerAlexandre Oliva <lxoliva@fsfla.org>2014-10-13 17:23:24 +0000
commita57062a9cbc22a7ba6e54ef1de09c86eacd5d74e (patch)
treed90722efa39bf43f8643a4ca8c5c465abc7163bd /freed-ora/current
parent981d6750aafe0108b3c184dd2a202e3ce926c18e (diff)
downloadlinux-libre-raptor-a57062a9cbc22a7ba6e54ef1de09c86eacd5d74e.tar.gz
linux-libre-raptor-a57062a9cbc22a7ba6e54ef1de09c86eacd5d74e.zip
3.14.21-100.fc19.gnu
Diffstat (limited to 'freed-ora/current')
-rw-r--r--freed-ora/current/f19/kernel.spec14
-rw-r--r--freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign7
-rw-r--r--freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign7
-rw-r--r--freed-ora/current/f19/sources2
-rw-r--r--freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch92
5 files changed, 15 insertions, 107 deletions
diff --git a/freed-ora/current/f19/kernel.spec b/freed-ora/current/f19/kernel.spec
index 123eb73cb..450942aeb 100644
--- a/freed-ora/current/f19/kernel.spec
+++ b/freed-ora/current/f19/kernel.spec
@@ -112,7 +112,7 @@ Summary: The Linux kernel
%if 0%{?released_kernel}
# Do we have a -stable update to apply?
-%define stable_update 20
+%define stable_update 21
# Is it a -stable RC?
%define stable_rc 0
# Set rpm version accordingly
@@ -816,9 +816,6 @@ Patch25109: revert-input-wacom-testing-result-shows-get_report-is-unnecessary.pa
Patch25110: 0001-ideapad-laptop-Blacklist-rfkill-control-on-the-Lenov.patch
Patch25111: 0002-ideapad-laptop-Change-Lenovo-Yoga-2-series-rfkill-ha.patch
-#CVE-2014-6410 rhbz 1141809 1141810
-Patch26026: udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch
-
# END OF PATCH DEFINITIONS
%endif
@@ -1577,9 +1574,6 @@ ApplyPatch revert-input-wacom-testing-result-shows-get_report-is-unnecessary.pat
ApplyPatch 0001-ideapad-laptop-Blacklist-rfkill-control-on-the-Lenov.patch
ApplyPatch 0002-ideapad-laptop-Change-Lenovo-Yoga-2-series-rfkill-ha.patch
-#CVE-2014-6410 rhbz 1141809 1141810
-ApplyPatch udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch
-
# END OF PATCH APPLICATIONS
%endif
@@ -2403,6 +2397,12 @@ fi
# and build.
%changelog
+* Sat Oct 11 2014 Alexandre Oliva <lxoliva@fsfla.org> -libre
+- GNU Linux-libre 3.14.21-gnu.
+
+* Thu Oct 09 2014 Justin M. Forbes <jforbes@fedoraproject.org> - 3.14.21-100
+- Linux v3.14.21
+
* Mon Oct 6 2014 Alexandre Oliva <lxoliva@fsfla.org> -libre
- GNU Linux-libre 3.14.20-gnu.
diff --git a/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign b/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign
deleted file mode 100644
index 90ad49930..000000000
--- a/freed-ora/current/f19/patch-3.14-gnu-3.14.20-gnu.xz.sign
+++ /dev/null
@@ -1,7 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2
-
-iEYEABECAAYFAlQzbL8ACgkQvLfPh359R6ecMwCfcOJQJEzEiROJJhxki+M+liS+
-cR8AoIXkmrS08zka8DuJmJhNoT/dxO6d
-=CIUA
------END PGP SIGNATURE-----
diff --git a/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign b/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign
new file mode 100644
index 000000000..eae3902a2
--- /dev/null
+++ b/freed-ora/current/f19/patch-3.14-gnu-3.14.21-gnu.xz.sign
@@ -0,0 +1,7 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2
+
+iEYEABECAAYFAlQ3T30ACgkQvLfPh359R6dK0QCfXAqoyRPuGWpqL+5zMj4Y02YC
+2HAAn2TF62GBT0NXXGRhQY1c5yf4iJiy
+=H1GE
+-----END PGP SIGNATURE-----
diff --git a/freed-ora/current/f19/sources b/freed-ora/current/f19/sources
index 49706df50..3b3517aea 100644
--- a/freed-ora/current/f19/sources
+++ b/freed-ora/current/f19/sources
@@ -1,2 +1,2 @@
c108ec52eeb2a9b9ddbb8d12496ff25f linux-libre-3.14-gnu.tar.xz
-8a8733b7bc6ad5ca2106a266a77499b2 patch-3.14-gnu-3.14.20-gnu.xz
+fcd9a5665fb3fcec38abea5e366f4427 patch-3.14-gnu-3.14.21-gnu.xz
diff --git a/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch b/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch
deleted file mode 100644
index a8839661b..000000000
--- a/freed-ora/current/f19/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch
+++ /dev/null
@@ -1,92 +0,0 @@
-From a45318b5ff8c505afcbf04a1c5fa7dbe426d9588 Mon Sep 17 00:00:00 2001
-From: Jan Kara <jack@suse.cz>
-Date: Thu, 4 Sep 2014 14:06:55 +0200
-Subject: [PATCH] udf: Avoid infinite loop when processing indirect ICBs
-
-We did not implement any bound on number of indirect ICBs we follow when
-loading inode. Thus corrupted medium could cause kernel to go into an
-infinite loop, possibly causing a stack overflow.
-
-Fix the possible stack overflow by removing recursion from
-__udf_read_inode() and limit number of indirect ICBs we follow to avoid
-infinite loops.
-
-Bugzilla: 1141810
-Upstream-status: 3.17
-
-Signed-off-by: Jan Kara <jack@suse.cz>
----
- fs/udf/inode.c | 35 +++++++++++++++++++++--------------
- 1 file changed, 21 insertions(+), 14 deletions(-)
-
-diff --git a/fs/udf/inode.c b/fs/udf/inode.c
-index 236cd48184c2..a932f7740b51 100644
---- a/fs/udf/inode.c
-+++ b/fs/udf/inode.c
-@@ -1271,13 +1271,22 @@ update_time:
- return 0;
- }
-
-+/*
-+ * Maximum length of linked list formed by ICB hierarchy. The chosen number is
-+ * arbitrary - just that we hopefully don't limit any real use of rewritten
-+ * inode on write-once media but avoid looping for too long on corrupted media.
-+ */
-+#define UDF_MAX_ICB_NESTING 1024
-+
- static void __udf_read_inode(struct inode *inode)
- {
- struct buffer_head *bh = NULL;
- struct fileEntry *fe;
- uint16_t ident;
- struct udf_inode_info *iinfo = UDF_I(inode);
-+ unsigned int indirections = 0;
-
-+reread:
- /*
- * Set defaults, but the inode is still incomplete!
- * Note: get_new_inode() sets the following on a new inode:
-@@ -1314,28 +1323,26 @@ static void __udf_read_inode(struct inode *inode)
- ibh = udf_read_ptagged(inode->i_sb, &iinfo->i_location, 1,
- &ident);
- if (ident == TAG_IDENT_IE && ibh) {
-- struct buffer_head *nbh = NULL;
- struct kernel_lb_addr loc;
- struct indirectEntry *ie;
-
- ie = (struct indirectEntry *)ibh->b_data;
- loc = lelb_to_cpu(ie->indirectICB.extLocation);
-
-- if (ie->indirectICB.extLength &&
-- (nbh = udf_read_ptagged(inode->i_sb, &loc, 0,
-- &ident))) {
-- if (ident == TAG_IDENT_FE ||
-- ident == TAG_IDENT_EFE) {
-- memcpy(&iinfo->i_location,
-- &loc,
-- sizeof(struct kernel_lb_addr));
-- brelse(bh);
-- brelse(ibh);
-- brelse(nbh);
-- __udf_read_inode(inode);
-+ if (ie->indirectICB.extLength) {
-+ brelse(bh);
-+ brelse(ibh);
-+ memcpy(&iinfo->i_location, &loc,
-+ sizeof(struct kernel_lb_addr));
-+ if (++indirections > UDF_MAX_ICB_NESTING) {
-+ udf_err(inode->i_sb,
-+ "too many ICBs in ICB hierarchy"
-+ " (max %d supported)\n",
-+ UDF_MAX_ICB_NESTING);
-+ make_bad_inode(inode);
- return;
- }
-- brelse(nbh);
-+ goto reread;
- }
- }
- brelse(ibh);
---
-2.1.0
-
OpenPOWER on IntegriCloud