Accepted linux-signed-arm64 4.19.235+1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 17 Mar 2022 20:48:39 +0100
Source: linux-signed-arm64
Architecture: source
Version: 4.19.235+1
Distribution: buster-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-arm64 (4.19.235+1) buster; urgency=medium
.
* Sign kernel from linux 4.19.235-1
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233
- mac80211_hwsim: report NOACK frames in tx_status
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
- [arm*] i2c: bcm2835: Avoid clock stretching timeouts
- [x86] ASoC: rt5682: do not block workqueue if card is unbound
- Input: clear BTN_RIGHT/MIDDLE on buttonpads
- cifs: fix double free race when mount fails in cifs_get_root()
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
- usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
- usb: gadget: clear related members when goto fail (CVE-2022-24958)
- ata: pata_hpt37x: fix PCI clock detection
- [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
- xfrm: fix MTU regression
- netfilter: fix use-after-free in __nf_register_net_hook()
- xfrm: fix the if_id check in changelink
- xfrm: enforce validity of offload input flags
- netfilter: nf_queue: don't assume sk is full socket
- netfilter: nf_queue: fix possible use-after-free
- batman-adv: Request iflink once in batadv-on-batadv check
- batman-adv: Request iflink once in batadv_get_real_netdevice
- batman-adv: Don't expect inter-netns unique iflink indices
- net: dcb: flush lingering app table entries for unregistered devices
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
- block: Fix fsync always failed if once failed
- PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
- xen/netfront: destroy queues before real_num_tx_queues is zeroed
- mac80211: fix forwarded mesh frames AC & queue selection
- [arm64,armhf] net: stmmac: fix return value of __setup handler
- net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
- efivars: Respect "block" flag in efivar_entry_set_safe()
- can: gs_usb: change active_channels's type from atomic_t to u8
- [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
functions
- net: chelsio: cxgb3: check the return value of pci_find_capability()
- nl80211: Handle nla_memdup failures in handle_nan_filter
- Input: elan_i2c - move regulator_[en|dis]able() out of
elan_[en|dis]able_power()
- Input: elan_i2c - fix regulator enable count imbalance after
suspend/resume
- HID: add mapping for KEY_ALL_APPLICATIONS
- memfd: fix F_SEAL_WRITE after shmem huge page allocated
- tracing/histogram: Fix sorting on old "cpu" value
- btrfs: add missing run of delayed items after unlink during log replay
- net: dcb: disable softirqs in dcbnl_flush_dev()
- hamradio: fix macro redefine warning
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.234
- [arm*] Provide a wrapper for SMCCC 1.1 calls
- [arm64,armhf] smccc/psci: add arm_smccc_1_1_get_conduit()
- [armhf] report Spectre v2 status through sysfs
- [armel,armhf] early traps initialisation
- [armel,armhf] use LOADADDR() to get load address of sections
- [armel,armhf] Spectre-BHB workaround
- [armel,armhf] include unprivileged BPF status in Spectre V2 reporting
- [armel,armhf] fix build error when BPF_SYSCALL is disabled
- [armel,armhf] fix co-processor register typo
- [armel,armhf] Do not use NOCROSSREFS directive with ld.lld
- [armhf] fix build warning in proc-v7-bugs.c
- xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
(CVE-2022-23040, XSA-396)
- xen/grant-table: add gnttab_try_end_foreign_access() (CVE-2022-23036,
CVE-2022-23038, XSA-396)
- xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
(CVE-2022-23036, XSA-396)
- xen/netfront: don't use gnttab_query_foreign_access() for mapped status
(CVE-2022-23037, XSA-396)
- xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
(CVE-2022-23038, XSA-396)
- xen/gntalloc: don't use gnttab_query_foreign_access() (CVE-2022-23039,
XSA-396)
- xen: remove gnttab_query_foreign_access()
- xen/9p: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
- xen/pvcalls: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
- xen/gnttab: fix gnttab_end_foreign_access() without page specified
(CVE-2022-23041, XSA-396)
- xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
(CVE-2022-23042, XSA-396)
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.235
- net: qlogic: check the return value of dma_alloc_coherent() in
qed_vf_hw_prepare()
- qed: return status of qed_iov_get_link
- ax25: Fix NULL pointer dereference in ax25_kill_by_device
- net/mlx5: Fix size field in bufferx_reg struct
- NFC: port100: fix use-after-free in port100_send_complete
- net: phy: DP83822: clear MISR2 register to disable interrupts
- sctp: fix kernel-infoleak for SCTP sockets
- net-sysfs: add check for netdevice being present to speed_show
- Revert "xen-netback: remove 'hotplug-status' once it has served its
purpose"
- Revert "xen-netback: Check for hotplug-status existence before watching"
- tracing: Ensure trace buffer is at least 4096 bytes large
- [arm64] net: macb: Fix lost RX packet wakeup race in NAPI receive
- virtio: unexport virtio_finalize_features
- virtio: acknowledge all features before access
- [armel,armhf] fix Thumb2 regression with Spectre BHB
- ext4: add check to prevent attempting to resize an fs with sparse_super2
- btrfs: unlock newly allocated extent buffer after error (CVE-2021-4149)
.
[ Salvatore Bonaccorso ]
* [rt] Add new signing key for Daniel Wagner
* [rt] Update to 4.19.233-rt105
* Bump ABI to 20
* sctp: fix the processing for INIT chunk (CVE-2021-3772)
* sctp: fix the processing for INIT_ACK chunk (CVE-2021-3772)
Checksums-Sha1:
5f8610020a98bffd4dad31d9ca7e51c260d2460f 6605 linux-signed-arm64_4.19.235+1.dsc
0db8adf55f39f4c94a16384728591515ccb5902e 2050772 linux-signed-arm64_4.19.235+1.tar.xz
Checksums-Sha256:
a5e45e1e5f7afe56bb59a9b3655c3cfcf72b5158541981af02c0ebb5a906488f 6605 linux-signed-arm64_4.19.235+1.dsc
397cf6556fbddc1add6d188c1f24b60d2d366e4e75f06c51dbf0ebc1d9d0b31b 2050772 linux-signed-arm64_4.19.235+1.tar.xz
Files:
7a33566474350bf8e0996ce6df89905c 6605 kernel optional linux-signed-arm64_4.19.235+1.dsc
022df73e39711e0a1447d007bdabcebc 2050772 kernel optional linux-signed-arm64_4.19.235+1.tar.xz
-----BEGIN PGP SIGNATURE-----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=7Fvo
-----END PGP SIGNATURE-----