[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux-signed-amd64 5.10.92+2 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 28 Feb 2022 12:23:03 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.10.92+2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux-signed-amd64 (5.10.92+2) bullseye-security; urgency=high
 .
   * Sign kernel from linux 5.10.92-2
 .
   * lib/iov_iter: initialize "flags" in new pipe_buffer
   * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976)
   * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330)
   * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy
     (CVE-2022-22942)
   * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448)
   * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959)
   * tipc: improve size validations for received domain records (CVE-2022-0435)
   * [s390x] KVM: s390: Return error on SIDA memop on normal guest
     (CVE-2022-0516)
   * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258)
   * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375)
Checksums-Sha1:
 7914ab1984daabf4ed498be8f3711118717f0a1a 8601 linux-signed-amd64_5.10.92+2.dsc
 ecc48df92c9c332763b8c2b522aa7001471cb861 2728484 linux-signed-amd64_5.10.92+2.tar.xz
Checksums-Sha256:
 cc477e4400eb495d50a0cc4945adbd8278d590c140b0eea0f02a4338ac69125e 8601 linux-signed-amd64_5.10.92+2.dsc
 62462dffc9c5b7befdaf023ff56fb9cc9a1970516bda3ed90c1f8fcb41d5bcca 2728484 linux-signed-amd64_5.10.92+2.tar.xz
Files:
 613fc6a9a3a7e449e06b0c5b947befcd 8601 kernel optional linux-signed-amd64_5.10.92+2.dsc
 a107895b735873564cb6a7433f146807 2728484 kernel optional linux-signed-amd64_5.10.92+2.tar.xz

-----BEGIN PGP SIGNATURE-----
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=in02
-----END PGP SIGNATURE-----


Reply to: