commit 7ed9d69476af7b44f15751fcdbe171d66b3a94b7
Author: Jan RÄ™korajski <[email protected]>
Date:   Sun Jun 5 21:19:42 2016 +0200

    - 4.4.12

 kernel-small_fixes.patch | 46 ----------------------------------------------
 kernel.spec              |  4 ++--
 2 files changed, 2 insertions(+), 48 deletions(-)
---
diff --git a/kernel.spec b/kernel.spec
index 78dbfeb..89afec7 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -71,7 +71,7 @@
 
 %define                rel             1
 %define                basever         4.4
-%define                postver         .10
+%define                postver         .12
 
 # define this to '-%{basever}' for longterm branch
 %define                versuffix       -%{basever}
@@ -120,7 +120,7 @@ Source0:    
http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{basever}.tar.xz
 # Source0-md5: 9a78fa2eb6c68ca5a40ed5af08142599
 %if "%{postver}" != ".0"
 Patch0:                
http://www.kernel.org/pub/linux/kernel/v4.x/patch-%{version}.xz
-# Patch0-md5:  1b9a296c0d0b778e8173299618f2d84f
+# Patch0-md5:  80d71a51152029a3f2fe99ba94548009
 %endif
 Source1:       kernel.sysconfig
 
diff --git a/kernel-small_fixes.patch b/kernel-small_fixes.patch
index d0f2c8b..1870865 100644
--- a/kernel-small_fixes.patch
+++ b/kernel-small_fixes.patch
@@ -235,49 +235,3 @@ _______________________________________________
 xfs mailing list
 [email protected]
 http://oss.sgi.com/mailman/listinfo/xfs
-From 8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 Mon Sep 17 00:00:00 2001
-From: Jann Horn <[email protected]>
-Date: Tue, 26 Apr 2016 22:26:26 +0200
-Subject: bpf: fix double-fdput in replace_map_fd_with_map_ptr()
-
-When bpf(BPF_PROG_LOAD, ...) was invoked with a BPF program whose bytecode
-references a non-map file descriptor as a map file descriptor, the error
-handling code called fdput() twice instead of once (in __bpf_map_get() and
-in replace_map_fd_with_map_ptr()). If the file descriptor table of the
-current task is shared, this causes f_count to be decremented too much,
-allowing the struct file to be freed while it is still in use
-(use-after-free). This can be exploited to gain root privileges by an
-unprivileged user.
-
-This bug was introduced in
-commit 0246e64d9a5f ("bpf: handle pseudo BPF_LD_IMM64 insn"), but is only
-exploitable since
-commit 1be7f75d1668 ("bpf: enable non-root eBPF programs") because
-previously, CAP_SYS_ADMIN was required to reach the vulnerable code.
-
-(posted publicly according to request by maintainer)
-
-Signed-off-by: Jann Horn <[email protected]>
-Signed-off-by: Linus Torvalds <[email protected]>
-Acked-by: Alexei Starovoitov <[email protected]>
-Acked-by: Daniel Borkmann <[email protected]>
-Signed-off-by: David S. Miller <[email protected]>
----
- kernel/bpf/verifier.c | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
-index 618ef77..db2574e 100644
---- a/kernel/bpf/verifier.c
-+++ b/kernel/bpf/verifier.c
-@@ -2030,7 +2030,6 @@ static int replace_map_fd_with_map_ptr(struct 
verifier_env *env)
-                       if (IS_ERR(map)) {
-                               verbose("fd %d is not pointing to valid 
bpf_map\n",
-                                       insn->imm);
--                              fdput(f);
-                               return PTR_ERR(map);
-                       }
- 
--- 
-cgit v0.12
-
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/kernel.git/commitdiff/7ed9d69476af7b44f15751fcdbe171d66b3a94b7

_______________________________________________
pld-cvs-commit mailing list
[email protected]
http://lists.pld-linux.org/mailman/listinfo/pld-cvs-commit

Reply via email to