-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 22 Jul 2019 22:26:07 +0100 Binary: linux-doc-3.16 linux-manual-3.16 linux-source-3.16 linux-support-3.16.0-10 Source: linux Architecture: all source Version: 3.16.70-1 Distribution: jessie-security Urgency: high Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Ben Hutchings <ben@decadent.org.uk> Closes: 931307 Description: linux-doc-3.16 - Linux kernel specific documentation for version 3.16 linux-manual-3.16 - Linux kernel API manual pages for version 3.16 linux-source-3.16 - Linux kernel source for version 3.16 with Debian patches linux-support-3.16.0-10 - Support files for Linux 3.16 Changes: linux (3.16.70-1) jessie-security; urgency=high . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.69 https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.70 - staging: iio: adt7316: fix register and bit definitions - staging: iio: adt7316: invert the logic of the check for an ldac pin - staging: iio: adt7316: allow adt751x to use internal vref for all dacs - [armhf] clk: highbank: fix refcount leak in hb_clk_init() - [armhf] clk: socfpga: fix refcount leak - [armhf] clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() - [armhf] clk: imx6q: fix refcount leak in imx6q_clocks_init() - [armhf] clk: armada-370: fix refcount leak in a370_clk_init() - [armel] clk: kirkwood: fix refcount leak in kirkwood_clk_init() - [armhf] clk: armada-xp: fix refcount leak in axp_clk_init() - drm: Fix error handling in drm_legacy_addctx - RDMA/ocrdma: Fix out of bounds index check in query pkey - selinux: avoid silent denials in permissive mode under RCU walk - crypto: pcbc - remove bogus memcpy()s with src == dest - media: v4l2: i2c: ov7670: Fix PLL bypass register values - crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails - crypto: tgr192 - fix unaligned memory access - [armhf] ASoC: imx-sgtl5000: put of nodes if finding codec fails - hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable - [x86] applicom: Fix potential Spectre v1 vulnerabilities - rcu: Do RCU GP kthread self-wakeup from softirq and interrupt - tty: ipwireless: Fix potential NULL pointer dereference - ext2: Fix underflow in ext2_max_size() - devres: always use dev_name() in devm_ioremap_resource() - crypto: testmgr - skip crc32c context test for ahash algorithms - splice: don't merge into linked buffers - scsi: target/iscsi: Avoid iscsit_release_commands_from_conn() deadlock - USB: serial: cp210x: add ID for Ingenico 3070 - media: uvcvideo: Avoid NULL pointer dereference at the end of streaming - crypto: ahash - fix another early termination in hash walk - bcache: never writeback a discard operation - bcache: treat stale && dirty keys as bad keys - jbd2: clear dirty flag when revoking a buffer from an older transaction - ext4: fix check of inode in swap_inode_boot_loader - ext4: update quota information while swapping boot loader inode - ext4: add mask of ext4 flags to swap - parport_pc: fix find_superio io compare code, should use equal test. - ext4: fix crash during online resizing - [x86] iscsi_ibft: Fix missing break in switch statement - [x86] tpm/tpm_i2c_atmel: Return -E2BIG when the transfer is incomplete - [x86] tpm: Fix off-by-one when reading binary_bios_measurements - serial: 8250_pci: Fix number of ports for ACCES serial cards - serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() - USB: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 - cdc-wdm: pass return value of recover_from_urb_loss - libertas_tf: don't set URB_ZERO_PACKET on IN USB transfer - drm/radeon/evergreen_cs: fix missing break in switch statement - [x86] KVM: mmu: Do not cache MMIO accesses while memslots are in flux - fs/nfs: Fix nfs_parse_devname to not modify it's argument - [armhf] clocksource/drivers/exynos_mct: Fix error path in timer resources initialization - [armhf] mmc: omap: fix the maximum timeout setting - btrfs: init csum_list before possible free - ALSA: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 - Btrfs: fix corruption reading shared and compressed extents after hole punching - NFSv4.1: Reinitialise sequence results before retransmitting a request - 9p: use inode->i_lock to protect i_size_write() under 32-bit - net-sysfs: Fix mem leak in netdev_register_kobject - ip6mr: Do not call __IP6_INC_STATS() from preemptible context - CIFS: Do not reset lease state to NONE on lease break - nfsd: fix memory corruption caused by readdir - CIFS: Fix read after write for files with read caching - mm/vmalloc: fix size check for remap_vmalloc_range_partial() - mm: fix potential data race in SyS_swapon - mm, swap: bounds check swap_info array accesses to avoid NULL derefs - scsi: virtio_scsi: don't send sc payload with tmfs - lib/div64.c: off by one in shift - xen, cpu_hotplug: Prevent an out of bounds access - route: set the deleted fnhe fnhe_daddr to 0 in ip_del_fnhe to fix a race - vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() - gro_cells: make sure device is up in gro_cells_receive() - kernel/sysctl.c: add missing range check in do_proc_dointvec_minmax_conv - md: It's wrong to add len to sector_nr in raid10 reshape twice - md: Fix failed allocation of md_register_thread - net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling - net/mlx4_core: Fix qp mtt size calculation - l2tp: fix infoleak in l2tp_ip6_recvmsg() - pptp: dst_release sk_dst_cache in pptp_sock_destruct - tcp: refine memory limit test in tcp_fragment() (regression in 3.16.68-2) (Closes: #931307) - fs: stream_open - opener for stream-like files so that read and write can run simultaneously without deadlock - fuse: Add FOPEN_STREAM to use stream_open() - media: uvcvideo: Fix 'type' check leading to overflow (CVE-2019-2101) - netns: provide pure entropy for net_hash_mix() (CVE-2019-10639) . [ Ben Hutchings ] * Bump ABI to 10 * ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (CVE-2019-13272) Checksums-Sha1: 04c1f87d1cb0d1003347422965d57f76bfc20d69 143027 linux_3.16.70-1.dsc 1d7e1e020bdcd81a8904c9a46a267d345ae16fa7 82049540 linux_3.16.70.orig.tar.xz e5ab71be44e4cde506fe659270a7625eb60af88b 1166280 linux_3.16.70-1.debian.tar.xz 4288035c6641ccef03acce408426ce28f1ba1a16 457040 linux-support-3.16.0-10_3.16.70-1_all.deb c4cef8f93d9a517731bdabd320f196967ed2be97 8403568 linux-doc-3.16_3.16.70-1_all.deb 249314f41d01a63bbc86a1b14d64ddbe9d06cbb4 3801500 linux-manual-3.16_3.16.70-1_all.deb 071e3bc5708420c195dc9d50b830b02fe3930686 83898022 linux-source-3.16_3.16.70-1_all.deb Checksums-Sha256: a852a01bd912676dda8356ba434107f63951a8256a356a36dc0fd2c8ccbbc354 143027 linux_3.16.70-1.dsc e44b408616902e5ba791b39fcadc318c2e306bfc4b22c27f6fb7fc30a9df879f 82049540 linux_3.16.70.orig.tar.xz d84d99ef0ce0cec1ef661b483593f70af1b148dba9ef408f73564b0052a99bc9 1166280 linux_3.16.70-1.debian.tar.xz 0b361a2fa9e491906db24973cc804092607140e9b29ba8a4619e6314538a880b 457040 linux-support-3.16.0-10_3.16.70-1_all.deb bf803063fb9e1f382130b24cdee0b5b561504b516fd613b04044fde212baa69f 8403568 linux-doc-3.16_3.16.70-1_all.deb 0f80255dc23cf348c5bf8619eb496721501df0866a44a6130164f8b80e7e7747 3801500 linux-manual-3.16_3.16.70-1_all.deb fc5592e2c31daf7af21c6601b99eea7d7ef18a3fcc1b6f9d32dd1d124d6a3376 83898022 linux-source-3.16_3.16.70-1_all.deb Files: 6f8c095f67d5b9bab37a2f1381ff6a2c 143027 kernel optional linux_3.16.70-1.dsc fa3a7d1b6eae5bfc7a14081cf49163e9 82049540 kernel optional linux_3.16.70.orig.tar.xz 1b7d6cf2ebb973cecbee408b463c3348 1166280 kernel optional linux_3.16.70-1.debian.tar.xz 5eeadb916cbe1a0749679ab0f597919e 457040 devel optional linux-support-3.16.0-10_3.16.70-1_all.deb 1246cf1c2390d70e1260b87c9ff320a5 8403568 doc optional linux-doc-3.16_3.16.70-1_all.deb a3f6ed8fc490150b9e9fc15a371266cb 3801500 doc optional linux-manual-3.16_3.16.70-1_all.deb 4639bc5561d3545fd4567be600158c9e 83898022 kernel optional linux-source-3.16_3.16.70-1_all.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAl02RpgACgkQ57/I7JWG EQkw4Q/+OC3jXF4FOH9Pg4h0o5VQBOMJvs6JLeP+BRfmxPLuiW7vbFhKbcpXX+a7 0UKotMiiZg/GV/asjoXcWachtlst2TFO4E3D9n8QZM6aGCIVmyt5bk4SbSYiJ/yw tlxfQFdddVmhJlJpY8vo6wAw7dGP1UIVCPa1GgHiImS5t+CIYvRc0OF8/bSaRdwL ZSIMRl8vqv36FP8P5fHc1jy1fogkKYQ2MZPMx6Mc+KkUxXPqmUUFcL4GsdLfqX6y 8cVbtdeElwNRSLuUYy+xQoohruiWVwHQQmWvKznzNkgrwTiNSK5j7y4KqLEGnocU uOjA8PWYT8jyDvvQ8V5iY+6NMWFhY3/2d7wsWoKGHR+A6cWBpC0v2o84cjgnnziG j6KaUxXUy/nEEr1K9HxSu95aS/J0yg/A3/r1Lm0ivoXpfoR1v4nIGsAJfQzY/EvI 8Ckf9IpbqPAXu3HmrDmt/coLXMTa7YauBT9tQ/F4BnoSi7o5Kxi+4d508hFrP9uR HLmDQpr9f8ksE8MbWSa2btxuOWabchFA38SLhLfvIMT422b3cGnBcPYvCA6H2A+A a6QTBrEqEZWd3lArqow5dqpidbriVj75G56jJ40/dOnx6zjsixVTlot2phnlBoGX TMVmavjOaOSqZ6NpRmFrO1FZ+y6XjlWuFcnIJEbkle+myJDD9mw= =g8ao -----END PGP SIGNATURE-----