Accepted linux-signed-amd64 4.19.37+5+deb10u2 (source) into proposed-updates->stable-new, proposed-updates
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 08 Aug 2019 03:02:38 +0100
Source: linux-signed-amd64
Binary: kernel-image-4.19.0-5-amd64-di nic-modules-4.19.0-5-amd64-di nic-wireless-modules-4.19.0-5-amd64-di nic-shared-modules-4.19.0-5-amd64-di serial-modules-4.19.0-5-amd64-di usb-serial-modules-4.19.0-5-amd64-di ppp-modules-4.19.0-5-amd64-di pata-modules-4.19.0-5-amd64-di cdrom-core-modules-4.19.0-5-amd64-di firewire-core-modules-4.19.0-5-amd64-di scsi-core-modules-4.19.0-5-amd64-di scsi-modules-4.19.0-5-amd64-di scsi-nic-modules-4.19.0-5-amd64-di loop-modules-4.19.0-5-amd64-di btrfs-modules-4.19.0-5-amd64-di ext4-modules-4.19.0-5-amd64-di isofs-modules-4.19.0-5-amd64-di jfs-modules-4.19.0-5-amd64-di xfs-modules-4.19.0-5-amd64-di fat-modules-4.19.0-5-amd64-di md-modules-4.19.0-5-amd64-di multipath-modules-4.19.0-5-amd64-di usb-modules-4.19.0-5-amd64-di usb-storage-modules-4.19.0-5-amd64-di pcmcia-storage-modules-4.19.0-5-amd64-di fb-modules-4.19.0-5-amd64-di input-modules-4.19.0-5-amd64-di event-modules-4.19.0-5-amd64-di mouse-modules-4.19.0-5-amd64-di
nic-pcmcia-modules-4.19.0-5-amd64-di pcmcia-modules-4.19.0-5-amd64-di nic-usb-modules-4.19.0-5-amd64-di sata-modules-4.19.0-5-amd64-di acpi-modules-4.19.0-5-amd64-di i2c-modules-4.19.0-5-amd64-di crc-modules-4.19.0-5-amd64-di crypto-modules-4.19.0-5-amd64-di crypto-dm-modules-4.19.0-5-amd64-di efi-modules-4.19.0-5-amd64-di ata-modules-4.19.0-5-amd64-di mmc-core-modules-4.19.0-5-amd64-di mmc-modules-4.19.0-5-amd64-di nbd-modules-4.19.0-5-amd64-di squashfs-modules-4.19.0-5-amd64-di speakup-modules-4.19.0-5-amd64-di uinput-modules-4.19.0-5-amd64-di sound-modules-4.19.0-5-amd64-di compress-modules-4.19.0-5-amd64-di udf-modules-4.19.0-5-amd64-di fuse-modules-4.19.0-5-amd64-di mtd-core-modules-4.19.0-5-amd64-di linux-image-4.19.0-5-amd64 linux-image-4.19.0-5-cloud-amd64
linux-image-4.19.0-5-rt-amd64
Architecture: source
Version: 4.19.37+5+deb10u2
Distribution: buster-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <ben@decadent.org.uk>
Description:
acpi-modules-4.19.0-5-amd64-di - ACPI support modules (udeb)
ata-modules-4.19.0-5-amd64-di - ATA disk modules (udeb)
btrfs-modules-4.19.0-5-amd64-di - BTRFS filesystem support (udeb)
cdrom-core-modules-4.19.0-5-amd64-di - CDROM support (udeb)
compress-modules-4.19.0-5-amd64-di - lzo modules (udeb)
crc-modules-4.19.0-5-amd64-di - CRC modules (udeb)
crypto-dm-modules-4.19.0-5-amd64-di - devicemapper crypto module (udeb)
crypto-modules-4.19.0-5-amd64-di - crypto modules (udeb)
efi-modules-4.19.0-5-amd64-di - EFI modules (udeb)
event-modules-4.19.0-5-amd64-di - Event support (udeb)
ext4-modules-4.19.0-5-amd64-di - ext2/ext3/ext4 filesystem support (udeb)
fat-modules-4.19.0-5-amd64-di - FAT filesystem support (udeb)
fb-modules-4.19.0-5-amd64-di - Frame buffer support (udeb)
firewire-core-modules-4.19.0-5-amd64-di - Core FireWire drivers (udeb)
fuse-modules-4.19.0-5-amd64-di - FUSE modules (udeb)
i2c-modules-4.19.0-5-amd64-di - i2c support modules (udeb)
input-modules-4.19.0-5-amd64-di - Input devices support (udeb)
isofs-modules-4.19.0-5-amd64-di - ISOFS filesystem support (udeb)
jfs-modules-4.19.0-5-amd64-di - JFS filesystem support (udeb)
kernel-image-4.19.0-5-amd64-di - Linux kernel image and core modules for the Debian installer (udeb)
linux-image-4.19.0-5-amd64 - ${unsigned:DescriptionShort} (signed)
linux-image-4.19.0-5-cloud-amd64 - ${unsigned:DescriptionShort} (signed)
linux-image-4.19.0-5-rt-amd64 - ${unsigned:DescriptionShort} (signed)
loop-modules-4.19.0-5-amd64-di - Loopback filesystem support (udeb)
md-modules-4.19.0-5-amd64-di - RAID and LVM support (udeb)
mmc-core-modules-4.19.0-5-amd64-di - MMC/SD/SDIO core modules (udeb)
mmc-modules-4.19.0-5-amd64-di - MMC/SD card modules (udeb)
mouse-modules-4.19.0-5-amd64-di - Mouse support (udeb)
mtd-core-modules-4.19.0-5-amd64-di - MTD core (udeb)
multipath-modules-4.19.0-5-amd64-di - Multipath support (udeb)
nbd-modules-4.19.0-5-amd64-di - Network Block Device modules (udeb)
nic-modules-4.19.0-5-amd64-di - NIC drivers (udeb)
nic-pcmcia-modules-4.19.0-5-amd64-di - Common PCMCIA NIC drivers (udeb)
nic-shared-modules-4.19.0-5-amd64-di - Shared NIC drivers (udeb)
nic-usb-modules-4.19.0-5-amd64-di - USB NIC drivers (udeb)
nic-wireless-modules-4.19.0-5-amd64-di - Wireless NIC drivers (udeb)
pata-modules-4.19.0-5-amd64-di - PATA drivers (udeb)
pcmcia-modules-4.19.0-5-amd64-di - Common PCMCIA drivers (udeb)
pcmcia-storage-modules-4.19.0-5-amd64-di - PCMCIA storage drivers (udeb)
ppp-modules-4.19.0-5-amd64-di - PPP drivers (udeb)
sata-modules-4.19.0-5-amd64-di - SATA drivers (udeb)
scsi-core-modules-4.19.0-5-amd64-di - Core SCSI subsystem (udeb)
scsi-modules-4.19.0-5-amd64-di - SCSI drivers (udeb)
scsi-nic-modules-4.19.0-5-amd64-di - SCSI drivers for converged NICs (udeb)
serial-modules-4.19.0-5-amd64-di - Serial drivers (udeb)
sound-modules-4.19.0-5-amd64-di - sound support (udeb)
speakup-modules-4.19.0-5-amd64-di - speakup modules (udeb)
squashfs-modules-4.19.0-5-amd64-di - squashfs modules (udeb)
udf-modules-4.19.0-5-amd64-di - UDF modules (udeb)
uinput-modules-4.19.0-5-amd64-di - uinput support (udeb)
usb-modules-4.19.0-5-amd64-di - USB support (udeb)
usb-serial-modules-4.19.0-5-amd64-di - USB serial drivers (udeb)
usb-storage-modules-4.19.0-5-amd64-di - USB storage support (udeb)
xfs-modules-4.19.0-5-amd64-di - XFS filesystem support (udeb)
Changes:
linux-signed-amd64 (4.19.37+5+deb10u2) buster-security; urgency=high
.
* Sign kernel from linux 4.19.37-5+deb10u2
.
[ Romain Perier ]
* [x86] x86/insn-eval: Fix use-after-free access to LDT entry (CVE-2019-13233)
* [powerpc*] mm/64s/hash: Reallocate context ids on fork (CVE-2019-12817)
* nfc: Ensure presence of required attributes in the deactivate_target handler
(CVE-2019-12984)
* binder: fix race between munmap() and direct reclaim (CVE-2019-1999)
* scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836)
* Input: gtco - bounds check collection indent level (CVE-2019-13631)
* floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283)
* inet: switch IP ID generator to siphash (CVE-2019-10638)
* floppy: fix div-by-zero in setup_format_params (CVE-2019-14284)
* Bluetooth: hci_uart: check for missing tty operations (CVE-2019-10207)
* [powerpc/tm] Fix oops on sigreturn on systems without TM (CVE-2019-13648)
.
[ Salvatore Bonaccorso ]
* [x86] cpufeatures: Carve out CQM features retrieval
* [x86] cpufeatures: Combine word 11 and 12 into a new scattered features
word
* [x86] speculation: Prepare entry code for Spectre v1 swapgs mitigations
* [x86] speculation: Enable Spectre v1 swapgs mitigations (CVE-2019-1125)
* [amd64] entry: Use JMP instead of JMPQ
* [x86] speculation/swapgs: Exclude ATOMs from speculation through SWAPGS
* Documentation: Add section about CPU vulnerabilities for Spectre
* Documentation: Add swapgs description to the Spectre v1 documentation
.
[ Ben Hutchings ]
* [x86] cpufeatures: Avoid ABI change for swapgs mitigations:
- Move swapgs feature bits to existing scattered words
- Revert "x86/cpufeatures: Combine word 11 and 12 into a new scattered
features word"
* inet: Avoid ABI change for IP ID hash change
Checksums-Sha1:
10501b7cc54dbb1b2933d11c2d9787c735b44ae6 7873 linux-signed-amd64_4.19.37+5+deb10u2.dsc
225912ac46eee754ff1c7a30cfe8eba84c8643a6 2416932 linux-signed-amd64_4.19.37+5+deb10u2.tar.xz
Checksums-Sha256:
b3d5fe780013b3316e8b5143876bb3999d47be0e404e7e09ea4a59258fc81a3b 7873 linux-signed-amd64_4.19.37+5+deb10u2.dsc
d9f0abd11acfa5e1325c170691621538972b899e84fcaacd287704db2d421d9e 2416932 linux-signed-amd64_4.19.37+5+deb10u2.tar.xz
Files:
8bc1a47020a4f6a14cc7adfb7f4f8472 7873 kernel optional linux-signed-amd64_4.19.37+5+deb10u2.dsc
957b0288d380b1f44f0573ffb1124c8a 2416932 kernel optional linux-signed-amd64_4.19.37+5+deb10u2.tar.xz
-----BEGIN PGP SIGNATURE-----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=9F40
-----END PGP SIGNATURE-----