Accepted linux-signed-amd64 5.10.127+2 (source) into proposed-updates->stable-new, proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted linux-signed-amd64 5.10.127+2 (source) into proposed-updates->stable-new, proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Wed, 27 Jul 2022 16:03:49 +0000
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id:Subject: Content-Transfer-Encoding:Content-Type:MIME-Version:To:Reply-To:From:Cc: Content-ID:Content-Description:In-Reply-To:References; bh=Nf64wQXwPtO3J6D76q6mr/NKgVKxwI+Tf3fMyJ/L3ac=; b=AZfAYRPHvHgUjhKCnVMpkrpEw/ 0sIev6jYddPwayMInxtR/p8RHWd8p0+aTZFoXQyGKu1xLemwkOKLphychI6o3j0itg1b+uaBy0x49 Ognzt/bm2fvq+Aa4yU3dYOhrftv6n240we/pzTq8wkY3LeAhfy0UpXOIj99zByJFLTvx3Wm2U5an+ uaDhTLuEVTHwidR5vKsE92pKocXh6mm5L6fFNy660iN+yVQN7G6Ze4QwEUX7/dmNhOML23L1YeuN2 L8BXb8AJmQYnWp0r4CO4bXkrmSQekFzIt9kfclUOjJ9/xsnqoGbDTKqSkybtpO4S8dp9IctGOMgcM ytzDMm1g==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1oGjVl-000HZm-O4@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 24 Jul 2022 00:32:10 +0200
Source: linux-signed-amd64
Architecture: source
Version: 5.10.127+2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <benh@debian.org>
Changes:
linux-signed-amd64 (5.10.127+2) bullseye-security; urgency=high
.
* Sign kernel from linux 5.10.127-2
.
* [amd64,arm64,armhf] wireguard: Clear keys after suspend despite
CONFIG_ANDROID=y
* netfilter: nf_tables: stricter validation of element data (CVE-2022-34918)
* net: rose: fix UAF bugs caused by timer handler (CVE-2022-2318)
* net: rose: fix UAF bug caused by rose_t0timer_expiry
* xen/{blk,net}front: fix leaking data in shared pages (CVE-2022-26365,
CVE-2022-33740)
* xen/{blk,net}front: force data bouncing when backend is untrusted
(CVE-2022-33741, CVE-2022-33742)
* xen-netfront: restore __skb_queue_tail() positioning in
xennet_get_responses() (CVE-2022-33743)
* [arm64,armhf] xen/arm: Fix race in RB-tree based P2M accounting
(CVE-2022-33744)
* fbdev: fbmem: Fix logo center image dx issue
* fbdev: Fix potential out-of-bounds writes (CVE-2021-33655):
- fbmem: Check virtual screen sizes in fb_set_var()
- fbcon: Disallow setting font bigger than screen size
- fbcon: Prevent that screen size is smaller than font size
Checksums-Sha1:
d9fe62c325de4ac7f6b7cda0957dcb8219f4da10 8609 linux-signed-amd64_5.10.127+2.dsc
8546673247e578c7c0498aa61710def18d29f8b0 2777604 linux-signed-amd64_5.10.127+2.tar.xz
Checksums-Sha256:
a12d9303ea731fa56b80a6d8b3e934e4fe2679ab7a9c794372f5b9ad3051e080 8609 linux-signed-amd64_5.10.127+2.dsc
41971991f6be0c2e3a26971016dc69e5f93619c7711e3f484fbb698d12a35ca5 2777604 linux-signed-amd64_5.10.127+2.tar.xz
Files:
7829c3617ef39e7582f38e3f346a6e65 8609 kernel optional linux-signed-amd64_5.10.127+2.dsc
f925d1de6fce50f1768fa5b9efee9350 2777604 kernel optional linux-signed-amd64_5.10.127+2.tar.xz
-----BEGIN PGP SIGNATURE-----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=9yoz
-----END PGP SIGNATURE-----