[ubuntu/utopic-proposed] linux-hammerhead 3.4.0-1.8 (Accepted)

Ricardo Salveti de Araujo ricardo.salveti at canonical.com
Thu Jul 17 14:47:36 UTC 2014


linux-hammerhead (3.4.0-1.8) utopic; urgency=low

  [ Javier Martinez Canillas ]

  * SAUCE: (no-up) apparmor: fix bug that constantly spam the console
    - LP: #1323526

  [ John Johansen ]

  * Revert "SAUCE: apparmor: fix bad lock balance when introspecting
    policy"
  * Revert "SAUCE: apparmor: fix memleak of replacedby struct"
  * Revert "SAUCE: apparmor: fix memleak of the profile hash"
  * Revert "SAUCE: apparmor: allocate path lookup buffers during init"
  * Revert "SAUCE: apparmor: fix unix domain sockets to be mediated on
    connection"
  * Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 4 snapshot"
  * SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 6 snapshot
  * SAUCE: (no-ip) apparmor: update configs for apparmor 3 alpha 6
  * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
    - LP: #1308761
  * SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot
    - LP: #1308765
  * SAUCE: (no-up) apparmor: fix apparmor refcount bug in apparmor_kill
    - LP: #1308764
  * SAUCE: (no-up) apparmor: use custom write_is_locked macro
    - LP: #1323530
  * SAUCE: (no-up) apparmor fix: remove unused cxt var for unix_sendmsg
  * SAUCE: (no-up) apparmor: fix disconnected bind mnts reconnection
    - LP: #1319984

  [ Tyler Hicks ]

  * [Config] CONFIG_ECRYPT_FS=y
  * [Config] Sync LSM config options
  * [Config] Sync crypto config options
  * [Config] Sync IPsec config options

  [ Upstream Kernel Changes ]

  * Revert "kernel/sys.c: fix stack memory content leak via UNAME26"
  * Revert "ptrace: ensure arch_ptrace/ptrace_request can never race with
    SIGKILL"
  * Revert "ptrace: introduce signal_wake_up_state() and
    ptrace_signal_wake_up()"
  * Revert "perf: Treat attr.config as u64 in perf_swevent_init()"
  * Revert "ARM: 7809/1: perf: fix event validation for software group
    leaders"
    - CVE-2013-4254
  * kernel/sys.c: fix stack memory content leak via UNAME26
    - CVE-2012-0957
  * use clamp_t in UNAME26 fix
    - CVE-2012-0957
  * ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()
    - CVE-2013-0871
  * ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
    - CVE-2013-0871
  * wake_up_process() should be never used to wakeup a TASK_STOPPED/TRACED
    task
    - CVE-2013-0871
  * net: fix incorrect credentials passing
    - CVE-2013-1979
  * perf: Treat attr.config as u64 in perf_swevent_init()
    - CVE-2013-2094
  * iscsi-target: fix heap buffer overflow on error
    - CVE-2013-2850
  * ARM: 7809/1: perf: fix event validation for software group leaders
    - CVE-2013-4254
  * n_tty: Fix n_tty_write crash when echoing in raw mode
    - CVE-2014-0196
  * floppy: ignore kernel-only members in FDRAWCMD ioctl input
    - CVE-2014-1737
  * floppy: don't write kernel-only members to FDRAWCMD ioctl output
    - CVE-2014-1738
  * futex: Test for pi_mutex on fault in futex_wait_requeue_pi()
    - CVE-2014-3153
  * futex: Fix bug in WARN_ON for NULL q.pi_state
    - CVE-2014-3153
  * futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi()
    - CVE-2014-3153
  * futex: Handle futex_pi OWNER_DIED take over correctly
    - CVE-2014-3153
  * futex: avoid wake_futex() for a PI futex_q
    - CVE-2014-3153
  * futex: Revert "futex: Mark get_robust_list as deprecated"
    - CVE-2014-3153
  * futex: fix handling of read-only-mapped hugepages
    - CVE-2014-3153
  * futex: Add another early deadlock detection check
    - CVE-2014-3153
  * futex: Prevent attaching to kernel threads
    - CVE-2014-3153
  * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
    uaddr2 in futex_requeue(..., requeue_pi=1)
    - CVE-2014-3153
  * futex: Validate atomic acquisition in futex_lock_pi_atomic()
    - CVE-2014-3153
  * futex: Always cleanup owner tid in unlock_pi
    - CVE-2014-3153
  * futex: Make lookup_pi_state more robust
    - CVE-2014-3153

Date: Fri, 11 Jul 2014 17:01:29 -0300
Changed-By: Ricardo Salveti de Araujo <ricardo.salveti at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/utopic/+source/linux-hammerhead/3.4.0-1.8
-------------- next part --------------
Format: 1.8
Date: Fri, 11 Jul 2014 17:01:29 -0300
Source: linux-hammerhead
Binary: linux-hammerhead-headers-3.4.0-1 linux-hammerhead-tools-common linux-hammerhead-tools-3.4.0-1 linux-image-3.4.0-1-hammerhead linux-headers-3.4.0-1-hammerhead linux-image-3.4.0-1-hammerhead-dbgsym
Architecture: source
Version: 3.4.0-1.8
Distribution: utopic
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Ricardo Salveti de Araujo <ricardo.salveti at canonical.com>
Description:
 linux-hammerhead-headers-3.4.0-1 - Header files related to Linux kernel version 3.4.0
 linux-hammerhead-tools-3.4.0-1 - Linux kernel version specific tools for version 3.4.0-1
 linux-hammerhead-tools-common - Linux kernel version specific tools for version 3.4.0
 linux-headers-3.4.0-1-hammerhead - Linux kernel headers for version 3.4.0 on Nexus 5
 linux-image-3.4.0-1-hammerhead - Linux kernel image for version 3.4.0 on Nexus 5
 linux-image-3.4.0-1-hammerhead-dbgsym - Linux kernel debug image for version 3.4.0 on Nexus 5
Launchpad-Bugs-Fixed: 1308761 1308764 1308765 1319984 1323526 1323530
Changes:
 linux-hammerhead (3.4.0-1.8) utopic; urgency=low
 .
   [ Javier Martinez Canillas ]
 .
   * SAUCE: (no-up) apparmor: fix bug that constantly spam the console
     - LP: #1323526
 .
   [ John Johansen ]
 .
   * Revert "SAUCE: apparmor: fix bad lock balance when introspecting
     policy"
   * Revert "SAUCE: apparmor: fix memleak of replacedby struct"
   * Revert "SAUCE: apparmor: fix memleak of the profile hash"
   * Revert "SAUCE: apparmor: allocate path lookup buffers during init"
   * Revert "SAUCE: apparmor: fix unix domain sockets to be mediated on
     connection"
   * Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 4 snapshot"
   * SAUCE: (no-up) apparmor: Sync to apparmor 3 - alpha 6 snapshot
   * SAUCE: (no-ip) apparmor: update configs for apparmor 3 alpha 6
   * SAUCE: (no-up) apparmor: fix apparmor spams log with warning message
     - LP: #1308761
   * SAUCE: (no-up) apparmor: fix refcount bug in apparmor pivotroot
     - LP: #1308765
   * SAUCE: (no-up) apparmor: fix apparmor refcount bug in apparmor_kill
     - LP: #1308764
   * SAUCE: (no-up) apparmor: use custom write_is_locked macro
     - LP: #1323530
   * SAUCE: (no-up) apparmor fix: remove unused cxt var for unix_sendmsg
   * SAUCE: (no-up) apparmor: fix disconnected bind mnts reconnection
     - LP: #1319984
 .
   [ Tyler Hicks ]
 .
   * [Config] CONFIG_ECRYPT_FS=y
   * [Config] Sync LSM config options
   * [Config] Sync crypto config options
   * [Config] Sync IPsec config options
 .
   [ Upstream Kernel Changes ]
 .
   * Revert "kernel/sys.c: fix stack memory content leak via UNAME26"
   * Revert "ptrace: ensure arch_ptrace/ptrace_request can never race with
     SIGKILL"
   * Revert "ptrace: introduce signal_wake_up_state() and
     ptrace_signal_wake_up()"
   * Revert "perf: Treat attr.config as u64 in perf_swevent_init()"
   * Revert "ARM: 7809/1: perf: fix event validation for software group
     leaders"
     - CVE-2013-4254
   * kernel/sys.c: fix stack memory content leak via UNAME26
     - CVE-2012-0957
   * use clamp_t in UNAME26 fix
     - CVE-2012-0957
   * ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up()
     - CVE-2013-0871
   * ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL
     - CVE-2013-0871
   * wake_up_process() should be never used to wakeup a TASK_STOPPED/TRACED
     task
     - CVE-2013-0871
   * net: fix incorrect credentials passing
     - CVE-2013-1979
   * perf: Treat attr.config as u64 in perf_swevent_init()
     - CVE-2013-2094
   * iscsi-target: fix heap buffer overflow on error
     - CVE-2013-2850
   * ARM: 7809/1: perf: fix event validation for software group leaders
     - CVE-2013-4254
   * n_tty: Fix n_tty_write crash when echoing in raw mode
     - CVE-2014-0196
   * floppy: ignore kernel-only members in FDRAWCMD ioctl input
     - CVE-2014-1737
   * floppy: don't write kernel-only members to FDRAWCMD ioctl output
     - CVE-2014-1738
   * futex: Test for pi_mutex on fault in futex_wait_requeue_pi()
     - CVE-2014-3153
   * futex: Fix bug in WARN_ON for NULL q.pi_state
     - CVE-2014-3153
   * futex: Forbid uaddr == uaddr2 in futex_wait_requeue_pi()
     - CVE-2014-3153
   * futex: Handle futex_pi OWNER_DIED take over correctly
     - CVE-2014-3153
   * futex: avoid wake_futex() for a PI futex_q
     - CVE-2014-3153
   * futex: Revert "futex: Mark get_robust_list as deprecated"
     - CVE-2014-3153
   * futex: fix handling of read-only-mapped hugepages
     - CVE-2014-3153
   * futex: Add another early deadlock detection check
     - CVE-2014-3153
   * futex: Prevent attaching to kernel threads
     - CVE-2014-3153
   * futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
     uaddr2 in futex_requeue(..., requeue_pi=1)
     - CVE-2014-3153
   * futex: Validate atomic acquisition in futex_lock_pi_atomic()
     - CVE-2014-3153
   * futex: Always cleanup owner tid in unlock_pi
     - CVE-2014-3153
   * futex: Make lookup_pi_state more robust
     - CVE-2014-3153
Checksums-Sha1:
 1fa93c0bdd8e5df7e46029aa3342fd752b1bc98b 2287 linux-hammerhead_3.4.0-1.8.dsc
 cc404a224098f0e7fae5216395d49745e35b696c 115722795 linux-hammerhead_3.4.0-1.8.tar.gz
Checksums-Sha256:
 d661606b9dddd28386ebb64063c863fc30420b8054e56be956cf2f737b3aff7c 2287 linux-hammerhead_3.4.0-1.8.dsc
 972b720239307daeb44e61300c64034e8c3c8dc73eb82a9775362c10a495f91e 115722795 linux-hammerhead_3.4.0-1.8.tar.gz
Files:
 2d4f5473645695443be86cacbe89962f 2287 devel optional linux-hammerhead_3.4.0-1.8.dsc
 e416e2b4e90c4d5ac79068bdca0463bb 115722795 devel optional linux-hammerhead_3.4.0-1.8.tar.gz


More information about the Utopic-changes mailing list