-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 05 Dec 2019 08:37:56 +0100
Source: linux
Architecture: source
Version: 5.4.2-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-ker...@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 945853
Changes:
 linux (5.4.2-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
     - Bluetooth: Fix invalid-free in bcsp_close()
     - ath9k_hw: fix uninitialized variable data
     - ath10k: Fix a NULL-ptr-deref bug in ath10k_usb_alloc_urb_from_pipe
       (CVE-2019-15099)
     - ath10k: Fix HOST capability QMI incompatibility
     - ath10k: restore QCA9880-AR1A (v1) detection
     - Revert "Bluetooth: hci_ll: set operational frequency earlier"
     - Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues"
     - md/raid10: prevent access of uninitialized resync_pages offset
     - [x86] insn: Fix awk regexp warnings
     - [x86] speculation: Fix incorrect MDS/TAA mitigation status
     - [x86] speculation: Fix redundant MDS mitigation message
     - nbd: prevent memory leak
     - [i386] x86/stackframe/32: Repair 32-bit Xen PV
     - [i386] x86/xen/32: Make xen_iret_crit_fixup() independent of frame
       layout
     - [i386] x86/xen/32: Simplify ring check in xen_iret_crit_fixup()
     - [i386] x86/doublefault/32: Fix stack canaries in the double fault
       handler
     - [i386] x86/pti/32: Size initial_page_table correctly
     - [i386] x86/cpu_entry_area: Add guard page for entry stack on 32bit
     - [i386] x86/entry/32: Fix IRET exception
     - [i386] x86/entry/32: Use %ss segment where required
     - [i386] x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALL
     - [i386] x86/entry/32: Unwind the ESPFIX stack earlier on exception entry
     - [i386] x86/entry/32: Fix NMI vs ESPFIX
     - [i386] x86/pti/32: Calculate the various PTI cpu_entry_area sizes
       correctly, make the CPU_ENTRY_AREA_PAGES assert precise
     - [i386] x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3
     - futex: Prevent robust futex exit race
     - ALSA: usb-audio: Fix NULL dereference at parsing BADD
     - ALSA: usb-audio: Fix Scarlett 6i6 Gen 2 port data
     - media: vivid: Set vid_cap_streaming and vid_out_streaming to true
     - media: vivid: Fix wrong locking that causes race conditions on streaming
       stop (CVE-2019-18683)
     - media: usbvision: Fix invalid accesses after device disconnect
     - media: usbvision: Fix races among open, close, and disconnect
     - cpufreq: Add NULL checks to show() and store() methods of cpufreq
     - futex: Move futex exit handling into futex code
     - futex: Replace PF_EXITPIDONE with a state
     - exit/exec: Seperate mm_release()
     - futex: Split futex_mm_release() for exit/exec
     - futex: Set task::futex_state to DEAD right after handling futex exit
     - futex: Mark the begin of futex exit explicitly
     - futex: Sanitize exit state handling
     - futex: Provide state handling for exec() as well
     - futex: Add mutex around futex exit
     - futex: Provide distinct return value when owner is exiting
     - futex: Prevent exit livelock
     - media: uvcvideo: Fix error path in control parsing failure
     - media: b2c2-flexcop-usb: add sanity checking (CVE-2019-15291)
     - media: cxusb: detect cxusb_ctrl_msg error in query
     - media: imon: invalid dereference in imon_touch_event
     - media: mceusb: fix out of bounds read in MCE receiver buffer
     - ALSA: hda - Disable audio component for legacy Nvidia HDMI codecs
     - usbip: tools: fix fd leakage in the function of read_attr_usbip_status
     - usbip: Fix uninitialized symbol 'nents' in stub_recv_cmd_submit()
     - usb-serial: cp201x: support Mark-10 digital force gauge
     - USB: chaoskey: fix error case of a timeout
     - appledisplay: fix error handling in the scheduled work
     - USB: serial: mos7840: add USB ID to support Moxa UPort 2210
     - USB: serial: mos7720: fix remote wakeup
     - USB: serial: mos7840: fix remote wakeup
     - USB: serial: option: add support for DW5821e with eSIM support
     - USB: serial: option: add support for Foxconn T77W968 LTE modules
     - [x86] staging: comedi: usbduxfast: usbduxfast_ai_cmdtest rounding error
     - [powerpc*] powerpc/book3s64: Fix link stack flush on context switch
       (CVE-2019-18660)
     - [powerpc*] KVM: PPC: Book3S HV: Flush link stack on guest exit to host
       kernel
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2
     - io_uring: async workers should inherit the user creds
     - net: separate out the msghdr copy from ___sys_{send,recv}msg()
     - net: disallow ancillary data for __sys_{send,recv}msg_file()
     - [arm64] crypto: inside-secure - Fix stability issue with Macchiatobin
     - driver core: platform: use the correct callback type for bus_find_device
     - [arm64,armel,armhf] usb: dwc2: use a longer core rest timeout in
       dwc2_core_reset()
     - [x86] staging: rtl8192e: fix potential use after free
     - staging: rtl8723bs: Drop ACPI device ids
     - staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids
     - USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P
     - [x86] mei: bus: prefix device names on bus with the bus name
     - [x86] mei: me: add comet point V device id
     - [x86] thunderbolt: Power cycle the router if NVM authentication fails
     - [x86] fpu: Don't cache access to fpu_fpregs_owner_ctx
     - macvlan: schedule bc_work even if error
     - mdio_bus: don't use managed reset-controller
     - net: macb: add missed tasklet_kill
     - net: psample: fix skb_over_panic
     - net: sched: fix `tc -s class show` no bstats on class with nolock
       subqueues
     - openvswitch: fix flow command message size
     - sctp: Fix memory leak in sctp_sf_do_5_2_4_dupcook
     - slip: Fix use-after-free Read in slip_open
     - sctp: cache netns in sctp_ep_common
     - openvswitch: drop unneeded BUG_ON() in ovs_flow_cmd_build_info()
     - openvswitch: remove another BUG_ON()
     - net: skmsg: fix TLS 1.3 crash with full sk_msg
     - tipc: fix link name length check
     - r8169: fix jumbo configuration for RTL8168evl
     - r8169: fix resume on cable plug-in
     - ext4: add more paranoia checking in ext4_expand_extra_isize handling
     - Revert "jffs2: Fix possible null-pointer dereferences in
       jffs2_add_frag_to_fragtree()"
     - HID: core: check whether Usage Page item is after Usage ID items
     - [x86] platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer
     - [x86] platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input
       size
 .
   [ Ben Hutchings ]
   * [armel] udeb: Replace m25p80 with spi-nor in mtd-modules (fixes FTBFS)
   * [ia64] udeb: Remove SGI SN2 modules (fixes FTBFS)
   * iio: Enable TI_ADS1015 as module, replacing SENSORS_ADS1015
   * [armhf] regulator: Really enable REGULATOR_STM32_PWR
   * [armhf] drm/panel: Enable DRM_PANEL_{SONY_ACX565AKM,TPO_TD028TTEC1,
     TPO_TD043MTEA1} as modules, replacing the corresponding omapdrm options
   * [armhf,arm64] platform/chrome: Change chromeos drivers back to modules
   * Build-Depend on kernel-wedge 2.102; remove workaround in debian/rules.real
   * debian/bin: Add script to update taint list for bug reporting script
   * linux-image: bug: Update taint list and use upstream descriptions
   * btrfs,fanotify: Use TAINT_AUX instead of TAINT_USER for unsupported
     features
 .
   [ Romain Perier ]
   * Enable VIRTIO_FS and VIRTIO_PMEM (Closes: #945853)
 .
   [ Aurelien Jarno]
   * [ppc64el] Fix building libbpf with recent binutils versions (fixes FTBFS).
 .
   [ Luca Boccassi ]
   * verity: enable DM_VERITY_VERIFY_ROOTHASH_SIG
Checksums-Sha1:
 12ceafc8990c3a3fa4f7c63bb2bb62deadbf23ec 206761 linux_5.4.2-1~exp1.dsc
 891109c518f6c5934818f77718d983809c879bb4 113629120 linux_5.4.2.orig.tar.xz
 a2fc33e6ec2270c5491da1897b721e4ad6d147ca 1155268 
linux_5.4.2-1~exp1.debian.tar.xz
 9aa451300cc0876f541088ab3d6d8799c48effe3 52692 
linux_5.4.2-1~exp1_source.buildinfo
Checksums-Sha256:
 9c33e6114c6c7cda45f4e00adf959e0fe57ac9a36bfb8d82c00ea8cfe3ce8375 206761 
linux_5.4.2-1~exp1.dsc
 ee960078785d25c7e3d4a70ed2fe2c9d3f630dbe180a94f8f9a29d44e28a814d 113629120 
linux_5.4.2.orig.tar.xz
 118f00d1bd7f744cc174b14ac2c3e1b91b2d4f979e0345dfd6d75b7d9224e8db 1155268 
linux_5.4.2-1~exp1.debian.tar.xz
 31a17cd26d6bce942a163198d1e28e27d11dc7ebf5b2363a1e2a556358c31a8b 52692 
linux_5.4.2-1~exp1_source.buildinfo
Files:
 1312f2491b7b144c4a852c2fba5b56f1 206761 kernel optional linux_5.4.2-1~exp1.dsc
 6f8858a58e7795477f2a0bbf2aaa7823 113629120 kernel optional 
linux_5.4.2.orig.tar.xz
 1d305dc9b659f66be07ed5ffbf8c4527 1155268 kernel optional 
linux_5.4.2-1~exp1.debian.tar.xz
 9e359319463dce2f2da288716929f0ad 52692 kernel optional 
linux_5.4.2-1~exp1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=a55l
-----END PGP SIGNATURE-----

Reply via email to