diff options
| author | Alexandre Oliva <lxoliva@fsfla.org> | 2018-02-07 02:28:05 +0000 |
|---|---|---|
| committer | Alexandre Oliva <lxoliva@fsfla.org> | 2018-02-07 02:28:05 +0000 |
| commit | fb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f (patch) | |
| tree | fe43f63fa93502755ed0fcf0d64102b441cdd232 /freed-ora/current | |
| parent | 9e211864448dfd5c6d9e3a67b5f3fa5339c555a0 (diff) | |
| download | linux-libre-raptor-fb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f.tar.gz linux-libre-raptor-fb1bddf666feb7abfcc7f6c65c2cca0ff1df5a5f.zip | |
4.14.17-300.fc27.gnu
Diffstat (limited to 'freed-ora/current')
| -rw-r--r-- | freed-ora/current/f27/kernel.spec | 13 | ||||
| -rw-r--r-- | freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch | 55 | ||||
| -rw-r--r-- | freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign | 6 | ||||
| -rw-r--r-- | freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign | 6 | ||||
| -rw-r--r-- | freed-ora/current/f27/sources | 2 |
5 files changed, 14 insertions, 68 deletions
diff --git a/freed-ora/current/f27/kernel.spec b/freed-ora/current/f27/kernel.spec index c8b100af8..68394e202 100644 --- a/freed-ora/current/f27/kernel.spec +++ b/freed-ora/current/f27/kernel.spec @@ -92,7 +92,7 @@ Summary: The Linux kernel %if 0%{?released_kernel} # Do we have a -stable update to apply? -%define stable_update 16 +%define stable_update 17 # Set rpm version accordingly %if 0%{?stable_update} %define stablerev %{stable_update} @@ -659,8 +659,6 @@ Patch321: bcm283x-dma-mapping-skip-USB-devices-when-configuring-DMA-during-probe # bcm2837 bluetooth support Patch323: bcm2837-bluetooth-support.patch -Patch324: rpi-graphics-fix.patch - # Generic fixes and enablement for Socionext SoC and 96board # https://patchwork.kernel.org/patch/9980861/ Patch331: PCI-aspm-deal-with-missing-root-ports-in-link-state-handling.patch @@ -677,9 +675,6 @@ Patch335: arm-exynos-fix-usb3.patch # rbhz 1519591 1520764 Patch500: dccp-CVE-2017-8824-use-after-free-in-DCCP-code.patch -# CVE-2018-5344 rhbz 1533909 1533911 -Patch507: loop-fix-concurrent-lo_open-lo_release.patch - # 550-600 Meltdown and Spectre Fixes Patch550: prevent-bounds-check-bypass-via-speculative-execution.patch @@ -2348,6 +2343,12 @@ fi # # %changelog +* Mon Feb 5 2018 Alexandre Oliva <lxoliva@fsfla.org> -libre +- GNU Linux-libre 4.14.17-gnu. + +* Mon Feb 05 2018 Justin M. Forbes <jforbes@fedoraproject.org> - 4.14.17-300 +- Linux v4.14.17 + * Wed Jan 31 2018 Alexandre Oliva <lxoliva@fsfla.org> -libre - GNU Linux-libre 4.14.16-gnu. diff --git a/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch b/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch deleted file mode 100644 index 37131a702..000000000 --- a/freed-ora/current/f27/loop-fix-concurrent-lo_open-lo_release.patch +++ /dev/null @@ -1,55 +0,0 @@ -From ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5 Mon Sep 17 00:00:00 2001 -From: Linus Torvalds <torvalds@linux-foundation.org> -Date: Fri, 5 Jan 2018 16:26:00 -0800 -Subject: [PATCH] loop: fix concurrent lo_open/lo_release -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -范龙飞 reports that KASAN can report a use-after-free in __lock_acquire. -The reason is due to insufficient serialization in lo_release(), which -will continue to use the loop device even after it has decremented the -lo_refcnt to zero. - -In the meantime, another process can come in, open the loop device -again as it is being shut down. Confusion ensues. - -Reported-by: 范龙飞 <long7573@126.com> -Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> -Signed-off-by: Jens Axboe <axboe@kernel.dk> ---- - drivers/block/loop.c | 10 ++++++++-- - 1 file changed, 8 insertions(+), 2 deletions(-) - -diff --git a/drivers/block/loop.c b/drivers/block/loop.c -index bc8e61506968..d5fe720cf149 100644 ---- a/drivers/block/loop.c -+++ b/drivers/block/loop.c -@@ -1581,9 +1581,8 @@ static int lo_open(struct block_device *bdev, fmode_t mode) - return err; - } - --static void lo_release(struct gendisk *disk, fmode_t mode) -+static void __lo_release(struct loop_device *lo) - { -- struct loop_device *lo = disk->private_data; - int err; - - if (atomic_dec_return(&lo->lo_refcnt)) -@@ -1610,6 +1609,13 @@ static void lo_release(struct gendisk *disk, fmode_t mode) - mutex_unlock(&lo->lo_ctl_mutex); - } - -+static void lo_release(struct gendisk *disk, fmode_t mode) -+{ -+ mutex_lock(&loop_index_mutex); -+ __lo_release(disk->private_data); -+ mutex_unlock(&loop_index_mutex); -+} -+ - static const struct block_device_operations lo_fops = { - .owner = THIS_MODULE, - .open = lo_open, --- -2.15.1 - diff --git a/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign b/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign deleted file mode 100644 index edabf60f0..000000000 --- a/freed-ora/current/f27/patch-4.14-gnu-4.14.16-gnu.xz.sign +++ /dev/null @@ -1,6 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWnJOBAAKCRC8t8+Hfn1H -p5C2AKCmF/umUWUGzB9TxbfKyflVdX2fLwCcDfg7U4Int2j5pQEsjznh+67maLM= -=jOWi ------END PGP SIGNATURE----- diff --git a/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign b/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign new file mode 100644 index 000000000..2d6c1d48c --- /dev/null +++ b/freed-ora/current/f27/patch-4.14-gnu-4.14.17-gnu.xz.sign @@ -0,0 +1,6 @@ +-----BEGIN PGP SIGNATURE----- + +iF0EABECAB0WIQRHRALIxYLa++OJxCe8t8+Hfn1HpwUCWnaGzAAKCRC8t8+Hfn1H +pyjwAKCi0AKJIN6M2iKQkPKXKHEomuvYbwCfeDCITV6u4IaKwAROD3PsWzCc06w= +=Lort +-----END PGP SIGNATURE----- diff --git a/freed-ora/current/f27/sources b/freed-ora/current/f27/sources index 7690f2579..b24724f30 100644 --- a/freed-ora/current/f27/sources +++ b/freed-ora/current/f27/sources @@ -1,3 +1,3 @@ SHA512 (linux-libre-4.14-gnu.tar.xz) = 0d4b0b8ec1ffc39c59295adf56f6a2cccf77cad56d8a8bf8072624bbb52ba3e684147ebed91d1528d2685423dd784c5fca0f3650f874f2b93cfc6b7689b9a87f SHA512 (perf-man-4.14.tar.gz) = 76a9d8adc284cdffd4b3fbb060e7f9a14109267707ce1d03f4c3239cd70d8d164f697da3a0f90a363fbcac42a61d3c378afbcc2a86f112c501b9cb5ce74ef9f8 -SHA512 (patch-4.14-gnu-4.14.16-gnu.xz) = 288b896baf9ae4d7cdf800696cceb81af1e722bde9fc20d21540def6e2df596da8c630daccdffe9fedbeee6feb42e1626f2aac172ca75bcb108c29ffc26f0b24 +SHA512 (patch-4.14-gnu-4.14.17-gnu.xz) = dea8872935dbd895a8ae5016f6972507e21f10f075fe32cb8921ac6422c0ac43700e5f317597c688bb8fcb3f3455b2e5cbd6c69a2aceae12d794fde5b7f77f4a |

