Accepted linux-4.9 4.9.168-1+deb9u5~deb8u1 (all source) into oldoldstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 13 Aug 2019 19:47:06 +0100
Binary: linux-doc-4.9 linux-headers-4.9.0-0.bpo.9-common linux-headers-4.9.0-0.bpo.9-common-rt linux-manual-4.9 linux-source-4.9 linux-support-4.9.0-0.bpo.9
Source: linux-4.9
Architecture: all source
Version: 4.9.168-1+deb9u5~deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <ben@decadent.org.uk>
Description:
linux-doc-4.9 - Linux kernel specific documentation for version 4.9
linux-headers-4.9.0-0.bpo.9-common - Common header files for Linux 4.9.0-0.bpo.9
linux-headers-4.9.0-0.bpo.9-common-rt - Common header files for Linux 4.9.0-0.bpo.9-rt
linux-manual-4.9 - Linux kernel API manual pages for version 4.9
linux-source-4.9 - Linux kernel source for version 4.9 with Debian patches
linux-support-4.9.0-0.bpo.9 - Support files for Linux 4.9
Changes:
linux-4.9 (4.9.168-1+deb9u5~deb8u1) jessie-security; urgency=medium
.
* Backport to jessie:
- [x86] Revert "xen/pciback: Don't disable PCI_COMMAND on PCI device
reset." (reintroduces CVE-2015-8553)
- [x86] Remove Breaks relation to qemu-system-x86
.
linux (4.9.168-1+deb9u5) stretch-security; urgency=high
.
* [amd64] Add mitigation for Spectre v1 swapgs (CVE-2019-1125):
- cpufeatures: Sort feature word 7
- speculation: Prepare entry code for Spectre v1 swapgs mitigations
- speculation: Enable Spectre v1 swapgs mitigations
- entry: Use JMP instead of JMPQ
- speculation/swapgs: Exclude ATOMs from speculation through SWAPGS
* [x86] xen/pciback: Don't disable PCI_COMMAND on PCI device reset.
(CVE-2015-8553)
- Add Breaks relation to incompatible qemu-system-x86 versions
* ipv6: check sk sk_type and protocol early in ip_mroute_set/getsockopt
* percpu: stop printing kernel addresses (CVE-2018-5995)
* scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836)
* block: blk_init_allocated_queue() set q->fq as NULL in the fail case
(CVE-2018-20856)
* vfio/type1: Limit DMA mappings per container (CVE-2019-3882)
* Bluetooth: hci_uart: check for missing tty operations (CVE-2019-10207)
* siphash: add cryptographically secure PRF
* inet: switch IP ID generator to siphash (CVE-2019-10638, CVE-2019-10639)
* Input: gtco - bounds check collection indent level (CVE-2019-13631)
* [ppc64el] tm: Fix oops on sigreturn on systems without TM (CVE-2019-13648)
* floppy: fix div-by-zero in setup_format_params (CVE-2019-14284)
* floppy: fix out-of-bounds read in next_valid_format
* floppy: fix invalid pointer dereference in drive_name
* floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283)
* inet: Avoid ABI change for IP ID hash change
* vhost: Fix possible infinite loop (CVE-2019-3900):
- vhost-net: set packet weight of tx polling to 2 * vq size
- vhost_net: use packet weight for rx handler, too
- vhost_net: introduce vhost_exceeds_weight()
- vhost: introduce vhost_exceeds_weight()
- vhost_net: fix possible infinite loop
- vhost: scsi: add weight support
* vhost: Ignore ABI changes
* netfilter: ctnetlink: don't use conntrack/expect object addresses as id
* xen: let alloc_xenballooned_pages() fail if not enough memory free
* tcp: Clear sk_send_head after purging the write queue
Checksums-Sha1:
cca1b3fdc7700584e039efae190ea1c93c04dfd6 15581 linux-4.9_4.9.168-1+deb9u5~deb8u1.dsc
cb3d7617e46747a5c673689850528ff69930a8df 2097692 linux-4.9_4.9.168-1+deb9u5~deb8u1.debian.tar.xz
4f4d8087dfb920973a6e1c02411f578cb4ba09d7 7681450 linux-headers-4.9.0-0.bpo.9-common_4.9.168-1+deb9u5~deb8u1_all.deb
0d0f2808b4fd697b29badb7df1c7c68b332ecd6d 5740712 linux-headers-4.9.0-0.bpo.9-common-rt_4.9.168-1+deb9u5~deb8u1_all.deb
2118b019d009677859b5974d0c7e0897b58cbb11 11417668 linux-doc-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
4317ae13253686506bf77636ad559a9b3e823c02 685558 linux-support-4.9.0-0.bpo.9_4.9.168-1+deb9u5~deb8u1_all.deb
ef9f927e7e056fb93d26be25750757d6df6f3449 3237820 linux-manual-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
fb8cc9ba05e6fa0ab0d94ba496dc2ee92eeb5cdc 96847172 linux-source-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
Checksums-Sha256:
dd39ed2915c0f9b7d67bfb03369c1214fac3667146ebce424d9bd846cc34011a 15581 linux-4.9_4.9.168-1+deb9u5~deb8u1.dsc
60e3eb7734f5ba6bd77a3d91c527ccd2a84a1f49f4a2a40e24d37bf456f8e4df 2097692 linux-4.9_4.9.168-1+deb9u5~deb8u1.debian.tar.xz
0bd4885613f91fae46e00333217c620d84d46f622558b1d2054167ae52d83ef9 7681450 linux-headers-4.9.0-0.bpo.9-common_4.9.168-1+deb9u5~deb8u1_all.deb
ddba276e7f6bd01089b45008df72347d8f12c6c67ad75668fff85fd7438e76ef 5740712 linux-headers-4.9.0-0.bpo.9-common-rt_4.9.168-1+deb9u5~deb8u1_all.deb
834b9ea5ae8e1ebc10f4c3374b7a55cbe912ffa2e3879c48afba5f564d92e91f 11417668 linux-doc-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
b0d8937da645d8c445a0657257069f75dfc087a76cb068bee4ee5dfafbc40ebc 685558 linux-support-4.9.0-0.bpo.9_4.9.168-1+deb9u5~deb8u1_all.deb
316a994e14420b5a411690e18977d50186d3d5ca9a660dd15e37c9d0abbe2ff7 3237820 linux-manual-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
b87d99dfaa6f250b88c1f6cf520363b7ab49fb838b5aa92882ba59f539940031 96847172 linux-source-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
Files:
9ab6790aeb9c178008d590aa25dd1238 15581 kernel optional linux-4.9_4.9.168-1+deb9u5~deb8u1.dsc
24617d45743e2c6af4cef519b8758306 2097692 kernel optional linux-4.9_4.9.168-1+deb9u5~deb8u1.debian.tar.xz
21faad1634a7d4b75d272553152fbf8e 7681450 kernel optional linux-headers-4.9.0-0.bpo.9-common_4.9.168-1+deb9u5~deb8u1_all.deb
d892c60528b46cbb9748e55976067814 5740712 kernel optional linux-headers-4.9.0-0.bpo.9-common-rt_4.9.168-1+deb9u5~deb8u1_all.deb
e00347359e563dc39ddbf1acd62a8e52 11417668 doc optional linux-doc-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
225d4ffffb467feca390ef810729619a 685558 devel optional linux-support-4.9.0-0.bpo.9_4.9.168-1+deb9u5~deb8u1_all.deb
e4d1c3293f5669f64b77d3083babeb6e 3237820 doc optional linux-manual-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
0c98794dd79404c8c770c6d45939e1b8 96847172 kernel optional linux-source-4.9_4.9.168-1+deb9u5~deb8u1_all.deb
-----BEGIN PGP SIGNATURE-----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=57Q6
-----END PGP SIGNATURE-----