[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux 4.19.118-2+deb10u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 07 Jun 2020 17:42:22 +0200
Source: linux
Architecture: source
Version: 4.19.118-2+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 960271
Changes:
 linux (4.19.118-2+deb10u1) buster-security; urgency=high
 .
   [ Salvatore Bonaccorso ]
   * selinux: properly handle multiple messages in selinux_netlink_send()
     (CVE-2020-10751)
   * fs/namespace.c: fix mountpoint reference counter race (CVE-2020-12114)
   * USB: core: Fix free-while-in-use bug in the USB S-Glibrary
     (CVE-2020-12464)
   * [x86] KVM: SVM: Fix potential memory leak in svm_cpu_init()
     (CVE-2020-12768)
   * scsi: sg: add sg_remove_request in sg_write (CVE-2020-12770)
   * USB: gadget: fix illegal array access in binding with UDC (CVE-2020-13143)
   * netlabel: cope with NULL catmap (CVE-2020-10711)
   * fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()
     (CVE-2020-10732)
   * kernel/relay.c: handle alloc_percpu returning NULL in relay_open
     (CVE-2019-19462)
   * mm: Fix mremap not considering huge pmd devmap (CVE-2020-10757)
   * [x86] KVM: nVMX: Always sync GUEST_BNDCFGS when it comes from vmcs01
   * KVM: Introduce a new guest mapping API
   * [arm64] kvm: fix compilation on aarch64
   * [s390x] kvm: fix compilation on s390
   * [s390x] kvm: fix compile on s390 part 2
   * KVM: Properly check if "page" is valid in kvm_vcpu_unmap
   * [x86] kvm: Introduce kvm_(un)map_gfn() (CVE-2019-3016)
   * [x86] kvm: Cache gfn to pfn translation (CVE-2019-3016)
   * [x86] KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (CVE-2019-3016)
   * [x86] KVM: Clean up host's steal time structure (CVE-2019-3016)
   * include/uapi/linux/swab.h: fix userspace breakage, use __BITS_PER_LONG for
     swap (Closes: #960271)
 .
   [ Ben Hutchings ]
   * propagate_one(): mnt_set_mountpoint() needs mount_lock
   * [x86] Add support for mitigation of Special Register Buffer Data Sampling
     (SRBDS) (CVE-2020-0543):
     - x86/cpu: Add 'table' argument to cpu_matches()
     - x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
       mitigation
     - x86/speculation: Add SRBDS vulnerability and mitigation documentation
     - x86/speculation: Add Ivy Bridge to affected list
   * [x86] speculation: Do not match steppings, to avoid an ABI change
Checksums-Sha1:
 7b6472fffa7d64e804c53d6b35bf073f4e228a0b 189318 linux_4.19.118-2+deb10u1.dsc
 5a7f4e3de9d484263eb7d907b527122d5a1f3051 107469088 linux_4.19.118.orig.tar.xz
 05924f5a3555c886889b62ff08588331e8f13222 3306732 linux_4.19.118-2+deb10u1.debian.tar.xz
 c0820d2a37e9a62aae88c34d503272b851ff0f09 47384 linux_4.19.118-2+deb10u1_source.buildinfo
Checksums-Sha256:
 955087d295f3a75078f5ffcd46168cb2852345683af30cc22ce1b2db583609d7 189318 linux_4.19.118-2+deb10u1.dsc
 353b99a93364cc9c54cd889acc71ffd3190101ad67f19238150691a3c6f95aaf 107469088 linux_4.19.118.orig.tar.xz
 d77e14c94986c0ef783588fb0829ff69a5e4bc3ae678c4f2e6aad8184db29edf 3306732 linux_4.19.118-2+deb10u1.debian.tar.xz
 9e0bec126ef0d291f6e95eb47dd7daf1d968ceb2cf4cf0c4e60567d8cab1271a 47384 linux_4.19.118-2+deb10u1_source.buildinfo
Files:
 b83432bce17ce82303c8eb3bc263b2f8 189318 kernel optional linux_4.19.118-2+deb10u1.dsc
 12f0a53ac0579cb01404de3bc62224c3 107469088 kernel optional linux_4.19.118.orig.tar.xz
 5ed5360704d2addae3a0a08b5fdec438 3306732 kernel optional linux_4.19.118-2+deb10u1.debian.tar.xz
 ab7d58e03dcc3475652781407cdcf2f0 47384 kernel optional linux_4.19.118-2+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7dDR9fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EDyQP/0Ux7Fb3IUiiGi9O8LgjXtZHYWUgI5zV
WTR50kVgLFai4hrlZsnt3KamOErjFjo3oYVnfAsHNBnkgXxGOYAnH9tV+HLC1GzO
PeZ7GHEM+OdvW8CmPjn6tTdni+EoyXcP0rTZ3kpKGVmr5kdTLfX0gsw/XLPGW+pe
k+E7mBCWaGWDn2HkGkN7/SEbcy9D6F7lNQqNI1tnFMXJSo+fBeVCV4lCjDROQaSE
Vr3IEgMurRYbv5Lw9icDQKYmT/DssMSPSjqMKlGSYowgtadwvnpXz8R05rwyyJG7
YlCFIUcagHbD8OrUna1+xDSUPEGxqF35qe45722VNltn7VTgWFRsPM5YkXvDEizZ
X38jLD0uwHESgTkH5BGFaFqu8cC6zkUdDkdhrU/u2L8pOttQLPq3ngKaqxKprty7
FlTogEXQqft7RwxBE9ckdCS1NUdaB6Gn7S5fKH9iOLPYeAL4pLm5xZZVxPCS0dXz
OKBLjxWAnUNG08hcKiPihmEF54EgHh+s2RZDrkSURgVP8qgxGaig17OKEK9Irunh
yKq0rZEQwCKMPc/YbQ/LWTYcW82QF2rXCe0qpEKn6nAhj7+3cKYHrVPTg31OuxMS
feSEYrtvf9Hok+bSkgCMG92joMFV4wWAq+EqnpQrpS4nhplw/2+U0rdJBTAGSCun
vLXZdrLK8uyb
=dcY4
-----END PGP SIGNATURE-----


Reply to: