-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 17 Mar 2022 20:48:39 +0100 Source: linux-signed-i386 Architecture: source Version: 4.19.235+1 Distribution: buster-proposed-updates Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Changes: linux-signed-i386 (4.19.235+1) buster; urgency=medium . * Sign kernel from linux 4.19.235-1 . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233 - mac80211_hwsim: report NOACK frames in tx_status - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work - [arm*] i2c: bcm2835: Avoid clock stretching timeouts - [x86] ASoC: rt5682: do not block workqueue if card is unbound - Input: clear BTN_RIGHT/MIDDLE on buttonpads - cifs: fix double free race when mount fails in cifs_get_root() - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958) - usb: gadget: clear related members when goto fail (CVE-2022-24958) - ata: pata_hpt37x: fix PCI clock detection - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min - xfrm: fix MTU regression - netfilter: fix use-after-free in __nf_register_net_hook() - xfrm: fix the if_id check in changelink - xfrm: enforce validity of offload input flags - netfilter: nf_queue: don't assume sk is full socket - netfilter: nf_queue: fix possible use-after-free - batman-adv: Request iflink once in batadv-on-batadv check - batman-adv: Request iflink once in batadv_get_real_netdevice - batman-adv: Don't expect inter-netns unique iflink indices - net: dcb: flush lingering app table entries for unregistered devices - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server - block: Fix fsync always failed if once failed - PCI: pciehp: Fix infinite loop in IRQ handler upon power fault - xen/netfront: destroy queues before real_num_tx_queues is zeroed - mac80211: fix forwarded mesh frames AC & queue selection - [arm64,armhf] net: stmmac: fix return value of __setup handler - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() - efivars: Respect "block" flag in efivar_entry_set_safe() - can: gs_usb: change active_channels's type from atomic_t to u8 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup() functions - net: chelsio: cxgb3: check the return value of pci_find_capability() - nl80211: Handle nla_memdup failures in handle_nan_filter - Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() - Input: elan_i2c - fix regulator enable count imbalance after suspend/resume - HID: add mapping for KEY_ALL_APPLICATIONS - memfd: fix F_SEAL_WRITE after shmem huge page allocated - tracing/histogram: Fix sorting on old "cpu" value - btrfs: add missing run of delayed items after unlink during log replay - net: dcb: disable softirqs in dcbnl_flush_dev() - hamradio: fix macro redefine warning https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.234 - [arm*] Provide a wrapper for SMCCC 1.1 calls - [arm64,armhf] smccc/psci: add arm_smccc_1_1_get_conduit() - [armhf] report Spectre v2 status through sysfs - [armel,armhf] early traps initialisation - [armel,armhf] use LOADADDR() to get load address of sections - [armel,armhf] Spectre-BHB workaround - [armel,armhf] include unprivileged BPF status in Spectre V2 reporting - [armel,armhf] fix build error when BPF_SYSCALL is disabled - [armel,armhf] fix co-processor register typo - [armel,armhf] Do not use NOCROSSREFS directive with ld.lld - [armhf] fix build warning in proc-v7-bugs.c - xen/xenbus: don't let xenbus_grant_ring() remove grants in error case (CVE-2022-23040, XSA-396) - xen/grant-table: add gnttab_try_end_foreign_access() (CVE-2022-23036, CVE-2022-23038, XSA-396) - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status (CVE-2022-23036, XSA-396) - xen/netfront: don't use gnttab_query_foreign_access() for mapped status (CVE-2022-23037, XSA-396) - xen/scsifront: don't use gnttab_query_foreign_access() for mapped status (CVE-2022-23038, XSA-396) - xen/gntalloc: don't use gnttab_query_foreign_access() (CVE-2022-23039, XSA-396) - xen: remove gnttab_query_foreign_access() - xen/9p: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396) - xen/pvcalls: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396) - xen/gnttab: fix gnttab_end_foreign_access() without page specified (CVE-2022-23041, XSA-396) - xen/netfront: react properly to failing gnttab_end_foreign_access_ref() (CVE-2022-23042, XSA-396) https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.235 - net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() - qed: return status of qed_iov_get_link - ax25: Fix NULL pointer dereference in ax25_kill_by_device - net/mlx5: Fix size field in bufferx_reg struct - NFC: port100: fix use-after-free in port100_send_complete - net: phy: DP83822: clear MISR2 register to disable interrupts - sctp: fix kernel-infoleak for SCTP sockets - net-sysfs: add check for netdevice being present to speed_show - Revert "xen-netback: remove 'hotplug-status' once it has served its purpose" - Revert "xen-netback: Check for hotplug-status existence before watching" - tracing: Ensure trace buffer is at least 4096 bytes large - [arm64] net: macb: Fix lost RX packet wakeup race in NAPI receive - virtio: unexport virtio_finalize_features - virtio: acknowledge all features before access - [armel,armhf] fix Thumb2 regression with Spectre BHB - ext4: add check to prevent attempting to resize an fs with sparse_super2 - btrfs: unlock newly allocated extent buffer after error (CVE-2021-4149) . [ Salvatore Bonaccorso ] * [rt] Add new signing key for Daniel Wagner * [rt] Update to 4.19.233-rt105 * Bump ABI to 20 * sctp: fix the processing for INIT chunk (CVE-2021-3772) * sctp: fix the processing for INIT_ACK chunk (CVE-2021-3772) Checksums-Sha1: 37b7ed9f2bd62aebe2161b2d8d68b40e0ea9968f 13506 linux-signed-i386_4.19.235+1.dsc 6269e7061d486bedff65d3b57486bedc6d1329d4 3517140 linux-signed-i386_4.19.235+1.tar.xz Checksums-Sha256: b0cda83cabeb6636676ef93017f4f5fcd44250844be0f6a484bbf6b474d87a85 13506 linux-signed-i386_4.19.235+1.dsc a0e6e8e47b4bfbf89b686df5c6254af983e1bd780ca7a04e5647aec638463db9 3517140 linux-signed-i386_4.19.235+1.tar.xz Files: 56434b778fcb54a994aaaab8473651b1 13506 kernel optional linux-signed-i386_4.19.235+1.dsc 6b8038bc286b7583095e2a1c07d4373c 3517140 kernel optional linux-signed-i386_4.19.235+1.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmI2aI4ACgkQi0FRiLdO Nza6EA/+LGZD6eqoUYmIWcFCyh4nHzJXfBZL5lyKTca1FKL9k1k63IMq5xxiySlj t35ULxpo7sXMQcRPVxcG9ZZcWvXcAmAfsEueaXrbikVWR39HsOSN5hTjHUKAR67U g5Pu0pwGWSD7boL11zWWY0Q+9eDz7snPe8/IHfb3+e3PlQZeWG/N2bBkug4aSw64 F5fRp961P8AR0mtWF2SpalDa+n7cY5UZ8RtnXC096QMTWji4w8qN92izwNtEn5Xw BkS6jKBS9DHOeO8ATuf9aI8mxe0sivOsKIin/y8nY4ZzCHHNuv0+0VTsTrJula1P j2mP7VDbNqZ5G3NQiZW5W8lPpIXprk14UC3vqfwpPkMhWbIRBiiHkNUaBgQxNrpj Tqb9+gLaJkyjBiMeTtiRLSRdp226xem7qDl+RArCx2agLQkgak4iRZEi26NJU6yC l72JsLj7pqECucETvlenl6Ah/NQ26rjFoGdgrkRoR50TlNbMGuz0Co9ZLquu+Ahb JU+q25XEFoc0uat9xn1tEGWWWpRkf/WQbquEuyiJ0zY95jwQE4cA7nIF5mfnMhsB TRpHRGg+XIssd4dOxoVgu2DfVeC0q1x6U1cahXmaDOdUpRCtuPSwNdyoVoni6i41 7KzhxfiuYHsg7ybGM4M2eo4kPoaPGIkBC8Q1aGNrYSHk7n7FnIY= =DbRk -----END PGP SIGNATURE-----