[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux-signed-amd64 4.19.235+1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 20:48:39 +0100
Source: linux-signed-amd64
Architecture: source
Version: 4.19.235+1
Distribution: buster-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux-signed-amd64 (4.19.235+1) buster; urgency=medium
 .
   * Sign kernel from linux 4.19.235-1
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233
     - mac80211_hwsim: report NOACK frames in tx_status
     - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
     - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
     - [x86] ASoC: rt5682: do not block workqueue if card is unbound
     - Input: clear BTN_RIGHT/MIDDLE on buttonpads
     - cifs: fix double free race when mount fails in cifs_get_root()
     - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
     - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
     - usb: gadget: clear related members when goto fail (CVE-2022-24958)
     - ata: pata_hpt37x: fix PCI clock detection
     - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
     - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
     - xfrm: fix MTU regression
     - netfilter: fix use-after-free in __nf_register_net_hook()
     - xfrm: fix the if_id check in changelink
     - xfrm: enforce validity of offload input flags
     - netfilter: nf_queue: don't assume sk is full socket
     - netfilter: nf_queue: fix possible use-after-free
     - batman-adv: Request iflink once in batadv-on-batadv check
     - batman-adv: Request iflink once in batadv_get_real_netdevice
     - batman-adv: Don't expect inter-netns unique iflink indices
     - net: dcb: flush lingering app table entries for unregistered devices
     - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
     - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
     - block: Fix fsync always failed if once failed
     - PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
     - xen/netfront: destroy queues before real_num_tx_queues is zeroed
     - mac80211: fix forwarded mesh frames AC & queue selection
     - [arm64,armhf] net: stmmac: fix return value of __setup handler
     - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
     - efivars: Respect "block" flag in efivar_entry_set_safe()
     - can: gs_usb: change active_channels's type from atomic_t to u8
     - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
       functions
     - net: chelsio: cxgb3: check the return value of pci_find_capability()
     - nl80211: Handle nla_memdup failures in handle_nan_filter
     - Input: elan_i2c - move regulator_[en|dis]able() out of
       elan_[en|dis]able_power()
     - Input: elan_i2c - fix regulator enable count imbalance after
       suspend/resume
     - HID: add mapping for KEY_ALL_APPLICATIONS
     - memfd: fix F_SEAL_WRITE after shmem huge page allocated
     - tracing/histogram: Fix sorting on old "cpu" value
     - btrfs: add missing run of delayed items after unlink during log replay
     - net: dcb: disable softirqs in dcbnl_flush_dev()
     - hamradio: fix macro redefine warning
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.234
     - [arm*] Provide a wrapper for SMCCC 1.1 calls
     - [arm64,armhf] smccc/psci: add arm_smccc_1_1_get_conduit()
     - [armhf] report Spectre v2 status through sysfs
     - [armel,armhf] early traps initialisation
     - [armel,armhf] use LOADADDR() to get load address of sections
     - [armel,armhf] Spectre-BHB workaround
     - [armel,armhf] include unprivileged BPF status in Spectre V2 reporting
     - [armel,armhf] fix build error when BPF_SYSCALL is disabled
     - [armel,armhf] fix co-processor register typo
     - [armel,armhf] Do not use NOCROSSREFS directive with ld.lld
     - [armhf] fix build warning in proc-v7-bugs.c
     - xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
       (CVE-2022-23040, XSA-396)
     - xen/grant-table: add gnttab_try_end_foreign_access() (CVE-2022-23036,
       CVE-2022-23038, XSA-396)
     - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
       (CVE-2022-23036, XSA-396)
     - xen/netfront: don't use gnttab_query_foreign_access() for mapped status
       (CVE-2022-23037, XSA-396)
     - xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
       (CVE-2022-23038, XSA-396)
     - xen/gntalloc: don't use gnttab_query_foreign_access() (CVE-2022-23039,
       XSA-396)
     - xen: remove gnttab_query_foreign_access()
     - xen/9p: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
     - xen/pvcalls: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
     - xen/gnttab: fix gnttab_end_foreign_access() without page specified
       (CVE-2022-23041, XSA-396)
     - xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
       (CVE-2022-23042, XSA-396)
     https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.235
     - net: qlogic: check the return value of dma_alloc_coherent() in
       qed_vf_hw_prepare()
     - qed: return status of qed_iov_get_link
     - ax25: Fix NULL pointer dereference in ax25_kill_by_device
     - net/mlx5: Fix size field in bufferx_reg struct
     - NFC: port100: fix use-after-free in port100_send_complete
     - net: phy: DP83822: clear MISR2 register to disable interrupts
     - sctp: fix kernel-infoleak for SCTP sockets
     - net-sysfs: add check for netdevice being present to speed_show
     - Revert "xen-netback: remove 'hotplug-status' once it has served its
       purpose"
     - Revert "xen-netback: Check for hotplug-status existence before watching"
     - tracing: Ensure trace buffer is at least 4096 bytes large
     - [arm64] net: macb: Fix lost RX packet wakeup race in NAPI receive
     - virtio: unexport virtio_finalize_features
     - virtio: acknowledge all features before access
     - [armel,armhf] fix Thumb2 regression with Spectre BHB
     - ext4: add check to prevent attempting to resize an fs with sparse_super2
     - btrfs: unlock newly allocated extent buffer after error (CVE-2021-4149)
 .
   [ Salvatore Bonaccorso ]
   * [rt] Add new signing key for Daniel Wagner
   * [rt] Update to 4.19.233-rt105
   * Bump ABI to 20
   * sctp: fix the processing for INIT chunk (CVE-2021-3772)
   * sctp: fix the processing for INIT_ACK chunk (CVE-2021-3772)
Checksums-Sha1:
 8956254fe5939827f8d8b1db9190d34aab2de96a 7929 linux-signed-amd64_4.19.235+1.dsc
 6f3ff846a3f24a0db28fa4142053999e4cab75cb 2657084 linux-signed-amd64_4.19.235+1.tar.xz
Checksums-Sha256:
 d6980ee98ceef4c79666ce0e955f28f78d05972d143747022a9e0b63c1b02498 7929 linux-signed-amd64_4.19.235+1.dsc
 c39bebc1cbcb1405e87ecde31128960508748ce48a499ee92dbacd274d765a40 2657084 linux-signed-amd64_4.19.235+1.tar.xz
Files:
 89092cdc758fa6fa3078579308188253 7929 kernel optional linux-signed-amd64_4.19.235+1.dsc
 6f73d76f83f9c6fd3a683dba55efa6c9 2657084 kernel optional linux-signed-amd64_4.19.235+1.tar.xz

-----BEGIN PGP SIGNATURE-----
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=WsqT
-----END PGP SIGNATURE-----


Reply to: