-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 07 Jun 2020 17:42:22 +0200 Source: linux Architecture: source Version: 4.19.118-2+deb10u1 Distribution: buster-security Urgency: high Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 960271 Changes: linux (4.19.118-2+deb10u1) buster-security; urgency=high . [ Salvatore Bonaccorso ] * selinux: properly handle multiple messages in selinux_netlink_send() (CVE-2020-10751) * fs/namespace.c: fix mountpoint reference counter race (CVE-2020-12114) * USB: core: Fix free-while-in-use bug in the USB S-Glibrary (CVE-2020-12464) * [x86] KVM: SVM: Fix potential memory leak in svm_cpu_init() (CVE-2020-12768) * scsi: sg: add sg_remove_request in sg_write (CVE-2020-12770) * USB: gadget: fix illegal array access in binding with UDC (CVE-2020-13143) * netlabel: cope with NULL catmap (CVE-2020-10711) * fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() (CVE-2020-10732) * kernel/relay.c: handle alloc_percpu returning NULL in relay_open (CVE-2019-19462) * mm: Fix mremap not considering huge pmd devmap (CVE-2020-10757) * [x86] KVM: nVMX: Always sync GUEST_BNDCFGS when it comes from vmcs01 * KVM: Introduce a new guest mapping API * [arm64] kvm: fix compilation on aarch64 * [s390x] kvm: fix compilation on s390 * [s390x] kvm: fix compile on s390 part 2 * KVM: Properly check if "page" is valid in kvm_vcpu_unmap * [x86] kvm: Introduce kvm_(un)map_gfn() (CVE-2019-3016) * [x86] kvm: Cache gfn to pfn translation (CVE-2019-3016) * [x86] KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (CVE-2019-3016) * [x86] KVM: Clean up host's steal time structure (CVE-2019-3016) * include/uapi/linux/swab.h: fix userspace breakage, use __BITS_PER_LONG for swap (Closes: #960271) . [ Ben Hutchings ] * propagate_one(): mnt_set_mountpoint() needs mount_lock * [x86] Add support for mitigation of Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543): - x86/cpu: Add 'table' argument to cpu_matches() - x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation - x86/speculation: Add SRBDS vulnerability and mitigation documentation - x86/speculation: Add Ivy Bridge to affected list * [x86] speculation: Do not match steppings, to avoid an ABI change Checksums-Sha1: 7b6472fffa7d64e804c53d6b35bf073f4e228a0b 189318 linux_4.19.118-2+deb10u1.dsc 5a7f4e3de9d484263eb7d907b527122d5a1f3051 107469088 linux_4.19.118.orig.tar.xz 05924f5a3555c886889b62ff08588331e8f13222 3306732 linux_4.19.118-2+deb10u1.debian.tar.xz c0820d2a37e9a62aae88c34d503272b851ff0f09 47384 linux_4.19.118-2+deb10u1_source.buildinfo Checksums-Sha256: 955087d295f3a75078f5ffcd46168cb2852345683af30cc22ce1b2db583609d7 189318 linux_4.19.118-2+deb10u1.dsc 353b99a93364cc9c54cd889acc71ffd3190101ad67f19238150691a3c6f95aaf 107469088 linux_4.19.118.orig.tar.xz d77e14c94986c0ef783588fb0829ff69a5e4bc3ae678c4f2e6aad8184db29edf 3306732 linux_4.19.118-2+deb10u1.debian.tar.xz 9e0bec126ef0d291f6e95eb47dd7daf1d968ceb2cf4cf0c4e60567d8cab1271a 47384 linux_4.19.118-2+deb10u1_source.buildinfo Files: b83432bce17ce82303c8eb3bc263b2f8 189318 kernel optional linux_4.19.118-2+deb10u1.dsc 12f0a53ac0579cb01404de3bc62224c3 107469088 kernel optional linux_4.19.118.orig.tar.xz 5ed5360704d2addae3a0a08b5fdec438 3306732 kernel optional linux_4.19.118-2+deb10u1.debian.tar.xz ab7d58e03dcc3475652781407cdcf2f0 47384 kernel optional linux_4.19.118-2+deb10u1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7dDR9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EDyQP/0Ux7Fb3IUiiGi9O8LgjXtZHYWUgI5zV WTR50kVgLFai4hrlZsnt3KamOErjFjo3oYVnfAsHNBnkgXxGOYAnH9tV+HLC1GzO PeZ7GHEM+OdvW8CmPjn6tTdni+EoyXcP0rTZ3kpKGVmr5kdTLfX0gsw/XLPGW+pe k+E7mBCWaGWDn2HkGkN7/SEbcy9D6F7lNQqNI1tnFMXJSo+fBeVCV4lCjDROQaSE Vr3IEgMurRYbv5Lw9icDQKYmT/DssMSPSjqMKlGSYowgtadwvnpXz8R05rwyyJG7 YlCFIUcagHbD8OrUna1+xDSUPEGxqF35qe45722VNltn7VTgWFRsPM5YkXvDEizZ X38jLD0uwHESgTkH5BGFaFqu8cC6zkUdDkdhrU/u2L8pOttQLPq3ngKaqxKprty7 FlTogEXQqft7RwxBE9ckdCS1NUdaB6Gn7S5fKH9iOLPYeAL4pLm5xZZVxPCS0dXz OKBLjxWAnUNG08hcKiPihmEF54EgHh+s2RZDrkSURgVP8qgxGaig17OKEK9Irunh yKq0rZEQwCKMPc/YbQ/LWTYcW82QF2rXCe0qpEKn6nAhj7+3cKYHrVPTg31OuxMS feSEYrtvf9Hok+bSkgCMG92joMFV4wWAq+EqnpQrpS4nhplw/2+U0rdJBTAGSCun vLXZdrLK8uyb =dcY4 -----END PGP SIGNATURE-----