Commit Graph

4408 Commits

Author SHA1 Message Date
Ben Hutchings 0899b0f554 Update to 4.19.67
* Drop patches which have been applied to 4.19-stable
* Drop "Revert "net: stmmac: Send TSO packets always from Queue 0"" in
  favour of upstream fix "net: stmmac: Re-work the queue selection for
  TSO packets"
* Refresh patches that became fuzzy
2019-08-20 01:51:22 +01:00
Ben Hutchings 64c3754b90 Merge branch 'buster-security' into buster
* Accept revert of "[sh4]: Check for kprobe trap number before trying
  to handle a kprobe trap" and update debian/changelog accordingly, as
  sh4 is not a release architecture
* Keep "[arm64] Improve support for the Huawei TaiShan server platform"
  which was reverted on the buster-security branch
2019-08-18 19:29:59 +01:00
Ben Hutchings 95a59b0c5d inet: Avoid ABI change for IP ID hash change 2019-08-08 03:01:19 +01:00
Ben Hutchings f02f2890aa [x86] cpufeatures: Avoid ABI change for swapgs mitigations
- Move swapgs feature bits to existing scattered words
- Revert "x86/cpufeatures: Combine word 11 and 12 into a new scattered
  features word"
2019-08-08 02:49:24 +01:00
Salvatore Bonaccorso 07a6d57831 Add patchset for CVE-2019-1125 2019-08-07 08:34:30 +02:00
Salvatore Bonaccorso fc21f10317 Adjust Origin header in CVE-2019-13648 patch
Gbp-Dch: Ignore
2019-08-05 19:17:17 +02:00
Romain Perier 65c2005956 [powerpc/tm] Fix oops on sigreturn on systems without TM (CVE-2019-13648) 2019-08-05 19:04:21 +02:00
Romain Perier 3b76691d24 Bluetooth: hci_uart: check for missing tty operations (CVE-2019-10207) 2019-08-05 18:57:05 +02:00
Romain Perier ec64cb4c87 floppy: fix div-by-zero in setup_format_params (CVE-2019-14284)
This retrieves the patch from the linux-4.19.y branch and refreshes the
previous one "floppy: fix out-of-bounds read in copy_buffer", because
this is firstly "floppy: fix div-by-zero in setup_format_params" that is
applied upstream, then the one regarding out-of-bounds read in copy_buffer.
The one for CVE-2019-14283 was previously refreshed because it was not
applicable directly. Now both patches are synchronized with upstream and
applied in the same order.
2019-08-05 17:56:29 +02:00
Romain Perier 24c58d8c20 inet: switch IP ID generator to siphash (CVE-2019-10638) 2019-07-30 11:20:38 +02:00
Romain Perier 4962cdb584 floppy: fix out-of-bounds read in copy_buffer (CVE-2019-14283) 2019-07-30 11:14:00 +02:00
Aurelien Jarno b394039686 [arm64] compat: Provide definition for COMPAT_SIGMINSTKSZ (Closes: #904385). 2019-07-29 22:36:47 +02:00
Uwe Kleine-König 8da545ad5d rtc-s35390a: backport fix to make hwclock able to read the time 2019-07-28 21:37:15 +02:00
Salvatore Bonaccorso e890639fa7 Replace Origin reference with reachable reference
Gbp-Dch: Ignore
2019-07-27 14:24:32 +02:00
Romain Perier 8cb769111f Input: gtco - bounds check collection indent level (CVE-2019-13631) 2019-07-27 13:15:59 +02:00
Romain Perier 167ecd4ada scsi: libsas: fix a race condition when smp task timeout (CVE-2018-20836) 2019-07-22 14:01:45 +02:00
Romain Perier 84b1bd80aa Revert unwanted changes for buster-security
We need to be based onto 4.19.37-5+deb10u1, and only include security
related topics. Things or improvements added to 4.19.37-6 (that is
already in sid) should be removed because they should not be uploaded
to buster-security accidentaly.
2019-07-22 11:44:02 +02:00
Salvatore Bonaccorso 01d9fffd29 Release linux (4.19.37-5+deb10u1).
-----BEGIN PGP SIGNATURE-----
 
 iQKmBAABCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl0xhh1fFIAAAAAALgAo
 aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
 ZWJpYW4ub3JnAAoJEAVMuPMTQ89E8nEP/iF7NUo1hvYNR/ueapgtpnMaHh/OeiGp
 x5/4RQW9Lo+Y8djiJWr9Kh7DVT7zp2k6OOb6o2qypgpEpFGGZAf02E3kheTJMhJz
 XxDHyGRflQpXDsEbPCcWCXvJjH/7puV/GWATPYo9qE/hs9rBAiFsOlOTqWSJf8Yd
 rVxjRRXe9/qRcOV4OJyiuL2GbeL7eO3TqTEl1NVSNP4V1RjYFFy/CUelWAcGzUOI
 tkk+NM7CEspQQhpIRkSGB+GyYMvOFNi2mkrz+mJbSUeb75uiZq3myJqHiQOKpwHe
 OGJiVBD4Ce8pv3PvR9bFZwgOV2t1XTDOeyUcmh8C07SblwI6iM/vi/nWw7B9VUEH
 X2EB/3/TuhKgJHtYpFZdi1mlRrt+6YYgDmbFVUyjojZhOONlVagwq2vaX0ep6yI4
 FOQo4kpCG10yse4JxUS0Unv6hk7ShfLe/Kb9lOJvPSZM5dCutWTQrRO05gTyFaev
 orMZou9lsXYDTzpFAICE2ZhCcySvYLqvPkkCoabiECMlJE2Ra/rsHiuQEcSNjG8E
 A8EqJhElt+W8mvTkofG5yL3oguD6yg4Qf0luKOl0bEcZyBXDbK4nHtHAwcBNoR5X
 zNfrikCyo7jPX3JGH3F8wYE9vc04SO+YEkvcyZcLTOUBiDIpZgC4r3IOyBDgzv1K
 KDIBNpFCBL0Z
 =794G
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.19.37-5+deb10u1' into buster

Release linux (4.19.37-5+deb10u1).
2019-07-20 23:07:45 +02:00
Salvatore Bonaccorso 869c89cb6d Use patch headers as generated by git format-patch-for-debian 2019-07-20 21:14:38 +02:00
Romain Perier 1e1ff4ce9c binder: fix race between munmap() and direct reclaim (CVE-2019-1999) 2019-07-20 18:36:49 +02:00
Romain Perier 091f76e86d nfc: Ensure presence of required attributes in the deactivate_target handler (CVE-2019-12984) 2019-07-20 18:21:14 +02:00
Romain Perier fbe4322901 [powerpc*] mm/64s/hash: Reallocate context ids on fork (CVE-2019-12817) 2019-07-20 17:17:59 +02:00
Romain Perier 7e902dbcd3 [x86] x86/insn-eval: Fix use-after-free access to LDT entry (CVE-2019-13233) 2019-07-20 17:17:43 +02:00
Salvatore Bonaccorso aa3c23fe0e Release linux (4.19.37-5+deb10u1).
-----BEGIN PGP SIGNATURE-----
 
 iQKmBAABCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl0xhh1fFIAAAAAALgAo
 aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
 ZWJpYW4ub3JnAAoJEAVMuPMTQ89E8nEP/iF7NUo1hvYNR/ueapgtpnMaHh/OeiGp
 x5/4RQW9Lo+Y8djiJWr9Kh7DVT7zp2k6OOb6o2qypgpEpFGGZAf02E3kheTJMhJz
 XxDHyGRflQpXDsEbPCcWCXvJjH/7puV/GWATPYo9qE/hs9rBAiFsOlOTqWSJf8Yd
 rVxjRRXe9/qRcOV4OJyiuL2GbeL7eO3TqTEl1NVSNP4V1RjYFFy/CUelWAcGzUOI
 tkk+NM7CEspQQhpIRkSGB+GyYMvOFNi2mkrz+mJbSUeb75uiZq3myJqHiQOKpwHe
 OGJiVBD4Ce8pv3PvR9bFZwgOV2t1XTDOeyUcmh8C07SblwI6iM/vi/nWw7B9VUEH
 X2EB/3/TuhKgJHtYpFZdi1mlRrt+6YYgDmbFVUyjojZhOONlVagwq2vaX0ep6yI4
 FOQo4kpCG10yse4JxUS0Unv6hk7ShfLe/Kb9lOJvPSZM5dCutWTQrRO05gTyFaev
 orMZou9lsXYDTzpFAICE2ZhCcySvYLqvPkkCoabiECMlJE2Ra/rsHiuQEcSNjG8E
 A8EqJhElt+W8mvTkofG5yL3oguD6yg4Qf0luKOl0bEcZyBXDbK4nHtHAwcBNoR5X
 zNfrikCyo7jPX3JGH3F8wYE9vc04SO+YEkvcyZcLTOUBiDIpZgC4r3IOyBDgzv1K
 KDIBNpFCBL0Z
 =794G
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.19.37-5+deb10u1' into buster-security

Release linux (4.19.37-5+deb10u1).
2019-07-19 11:15:23 +02:00
Salvatore Bonaccorso c6f3814dc4 ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME (CVE-2019-13272) 2019-07-19 10:45:11 +02:00
John Paul Adrian Glaubitz c342a968c4 [sh4]: Check for kprobe trap number before trying to handle a kprobe trap 2019-06-23 18:59:55 +02:00
Ben Hutchings c01ce3da12 Merge branch '93sam/linux-huawei-taishan-support' into sid
[arm64] Improve support for the Huawei TaiShan server platform

See merge request kernel-team/linux!151
2019-06-23 17:19:03 +01:00
Salvatore Bonaccorso eb5241a213 tcp: refine memory limit test in tcp_fragment()
Closes: #930904
2019-06-23 16:15:34 +02:00
Steve McIntyre 2c3b28ea8f [arm64] Improve support for the Huawei TaiShan server platform
Closes: #930554

Enable the HNS/ROCE Infiniband driver

Backport fixes from 4.20 and 4.21 for HNS3 networking, hisi_sas SAS
and HNS/ROCE Infiniband

Signed-off-by: Steve McIntyre <93sam@debian.org>
2019-06-23 10:58:07 +01:00
Romain Perier d2962338d6 [sparc64] Fix device naming inconsistency between sunhv_console and sunhv_reg (Closes: #926539) 2019-06-19 16:30:43 +02:00
Ben Hutchings 8533f7d9e6 tcp: Avoid ABI change for DoS fixes 2019-06-18 11:43:52 +01:00
Ben Hutchings 1e253edaa7 Add TCP DoS fixes 2019-06-17 19:46:08 +01:00
Ben Hutchings 4ea468554d mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (CVE-2019-10126) 2019-06-17 19:32:38 +01:00
Ben Hutchings e5664e23f5 mm/mincore.c: make mincore() more conservative (CVE-2019-5489) 2019-06-17 19:29:35 +01:00
Ben Hutchings 1894e89399 mwifiex: Don't abort on small, spec-compliant vendor IEs 2019-06-17 19:29:14 +01:00
Ben Hutchings 70b1e1a8fa mwifiex: Abort at too short BSS descriptor element 2019-06-17 19:25:01 +01:00
Ben Hutchings 54fa813858 mwifiex: Fix possible buffer overflows at parsing bss descriptor (CVE-2019-3846) 2019-06-17 19:24:10 +01:00
Aurelien Jarno cbcfb20ce0 [mips] Correctly bounds check virt_addr_valid (Closes: #929366) 2019-06-09 00:06:52 +02:00
Salvatore Bonaccorso 3b44df1499 Bluetooth: hidp: fix buffer overflow (CVE-2019-11884) 2019-06-07 15:25:30 +02:00
Salvatore Bonaccorso 8910626bca ext4: zero out the unused memory region in the extent tree block (CVE-2019-11833) 2019-06-07 14:53:07 +02:00
Salvatore Bonaccorso 23527ae20b brcmfmac: add subtype check for event handling in data path (CVE-2019-9503) 2019-06-07 14:49:05 +02:00
Salvatore Bonaccorso 8970aaa563 brcmfmac: assure SSID length from firmware is limited (CVE-2019-9500) 2019-06-07 14:43:58 +02:00
Ben Hutchings 9b28931859 libbpf: Use only 2 components in soversion, matching package name
Debian policy says the package name must change when the soname
changes.  We don't expect the ABI to change in a stable update,
so use only 2 components in both.
2019-05-19 14:48:13 +01:00
Ben Hutchings a6879552b5 Drop unnecessary changes from "libbpf: add SONAME to shared object"
It's not necessary to delete the definitions of the variables that
become unused.  Nor is it necessary to move the definition of
LIBBPF_VERSION before LIB_FILES, because the latter is defined
as recursively expanded (i.e. its variable references are not
immediately expanded).

This makes the actual change we're making clearer, and should
reduce the future work to maintain this patch.
2019-05-19 14:36:25 +01:00
Ben Hutchings 9329ccdf87 [powerpc*] 64s: Include cpu header (fixes FTBFS) 2019-05-15 23:07:44 +01:00
Ben Hutchings 1565dc00f4 [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
Together with a microcode update, this mitigates CVE-2018-12126,
CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091.
2019-05-10 12:03:12 +01:00
Ben Hutchings 2468672816 lockdown: Replace the other reference to a nonexistent manual page 2019-05-05 19:31:41 +01:00
Ben Hutchings ece5b4e4cd mm,fs: Prevent page refcount overflow (CVE-2019-11487) 2019-05-05 15:44:05 +01:00
Ben Hutchings 83f5e0f1ef tracing: Fix buffer_ref pipe ops
This is preparation for fixing CVE-2019-11487.
2019-05-05 15:42:32 +01:00
Ben Hutchings 4f3fa1e296 aio: Apply fixes from 4.19.38 (CVE-2019-10125) 2019-05-05 15:41:31 +01:00
Salvatore Bonaccorso 55a23e404a [amd64,arm64] vfio/type1: Limit DMA mappings per container (CVE-2019-3882) 2019-05-05 16:06:15 +02:00
Ben Hutchings 542ea0941f Undo typo 2019-05-05 13:54:32 +01:00
Ben Hutchings 2c62d20848 MODSIGN: Make shash allocation failure fatal 2019-05-05 13:47:00 +01:00
Ben Hutchings d220ad4bb0 Fix up headers for db/MOK patches
* Set a correct, specific Origin header for each patch, instead of a
  repo URL and "cherry picked" message
* Add back Date header and Cc pseudo-headers for the second series
* Note which patches have been modified by Luca
2019-05-05 13:41:38 +01:00
Luca Boccassi 643cc8a41c Add patches to enable loading dbx and MOKX blacklists
Import patches from:

https://lore.kernel.org/patchwork/cover/933178/

that allow to also load dbx and MOKX as blacklists for modules.
These patches also disable loading MOK/MOKX when secure boot is
not enabled, as the variables will not be safe, and to check the
variables attributes before accepting them.
2019-05-02 23:04:18 +01:00
Luca Boccassi 188df85f5b Add patches to enable loading db and MOK keys
Import patches from:

http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=keys-uefi

that enable a new option that automatically loads keys from db
and MOK into the secondary keyring, so that they can be used to
verify the signature of kernel modules. Enable the required KCONFIGs.
Allows users to self-sign modules (eg: dkms).
2019-05-02 22:59:42 +01:00
Ben Hutchings 7ebc9f9504 Update to 4.19.37
* Refresh/drop patches as appropriate
2019-04-28 18:55:53 +01:00
Salvatore Bonaccorso ad494c2131 tty: mark Siemens R3964 line discipline as BROKEN (CVE-2019-11486) 2019-04-26 16:11:56 +02:00
Salvatore Bonaccorso 1c6240e692 inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch() (CVE-2019-9857) 2019-04-26 14:54:14 +02:00
Ben Hutchings cda3581467 ntfs: Mark it as broken, and add CVE IDs that are being closed 2019-04-25 15:35:56 +01:00
Aurelien Jarno 223d2f61ad [mips] Fix indirect syscall tracing & seccomp filtering for big endian MIPS64 kernels with 32-bit userland. 2019-04-23 19:35:04 +02:00
Ben Hutchings fb4777ce47 lockdown: Refer to Debian wiki until manual page exists 2019-04-21 00:22:20 +01:00
Salvatore Bonaccorso 2dff862341 ACPICA: Namespace: remove address node from global list after method termination 2019-04-19 21:06:18 +02:00
Salvatore Bonaccorso 4eef18f8b7 xen/pciback: Don't disable PCI_COMMAND on PCI device reset. (CVE-2015-8553) 2019-04-14 22:39:31 +02:00
Luca Boccassi 5a39ad2910 Generate and install libbpf.pc
Backport patch from bpf-next and install libbpf.pc in libbpf-dev
2019-04-11 23:15:22 +01:00
Ben Hutchings 502148bb02 [armhf,arm64[ Revert "net: stmmac: Send TSO packets always from Queue 0" 2019-04-09 01:05:01 +01:00
Ben Hutchings 821ec1b181 Update to 4.19.34
* Drop/refresh patches as appropriate
2019-04-09 00:27:06 +01:00
Ben Hutchings 6039118f59 [powerpc*] vdso: Make vdso32 installation conditional in vdso_install
Closes: #785065

This finally removes the need for the ppc64el compiler to support
32-bit code generation, and removes a useless file from debug
packages on ppc64el.
2019-03-22 04:28:49 +00:00
Ben Hutchings 20351317dd [x86] Drop fix for #865303, which no longer affects Debian's OpenJDK
This workaround is no longer needed for Debian's OpenJDK packages:

* OpenJDK 7 is unfixed (bug #876068) but is not present in stretch or
  later suites
* OpenJDK 8 was fixed in unstable (bug #876051) and the fix was then
  included in a stretch security update
* OpenJDK 9 and later were fixed (bug #876069)

The workaround was never applied upstream and it also doesn't seem
like a good idea to have a Debian-specific VM quirk that weakens the
defence against Stack Clash.  Therefore drop it now rather than
including it in another release.
2019-03-13 18:37:35 +00:00
Ben Hutchings 515c2c91cf Add Origin fields and update headers for patches that are applied upstream 2019-03-10 22:08:58 +00:00
Ben Hutchings d96f9fae1b Refresh and fix header of "MIPS: Loongson: Introduce and use loongson_llsc_mb()" 2019-03-10 22:01:18 +00:00
YunQiang Su 2357044444 [mipsel/mips64el] Backport loongson workarounds
MIPS: Loongson: Introduce and use loongson_llsc_mb()
2019-03-06 21:15:23 +08:00
Marcin Juszkiewicz 8e3ab60ac6 update to 4.19.26 2019-03-05 14:28:55 +01:00
Marcin Juszkiewicz 37e6c11924 update to 4.19.24 2019-03-05 14:28:55 +01:00
Marcin Juszkiewicz 4a0b4cb79e update to 4.19.21 2019-03-05 14:28:55 +01:00
Vagrant Cascadian 5cb904c8a9 [arm64] Add patch from v4.20 to enable device-tree for Pine64-LTS. 2019-03-04 07:56:07 -08:00
Salvatore Bonaccorso 76a21e66e3 Btrfs: fix corruption reading shared and compressed extents after hole punching
Closes: #922306
2019-02-26 21:06:35 +01:00
dann frazier 1ebd53abbf arm64: lockdown: Move init_lockdown() call after efi_init()
The lockdown code for arm64 currently fails to engage when in Secure Boot
mode. Seth Forshee noticed that this is because init_lockdown() checks
for efi_enabled(EFI_BOOT), but that bit doesn't get set until uefi_init()
is called.
2019-02-17 06:09:47 -07:00
Vagrant Cascadian 357888c75c [arm64] Add patch from next-20190215 working around A64 timer issues. 2019-02-16 23:43:14 -08:00
Vagrant Cascadian 3f699085ff [armhf] Add patch from upstream fixing cpufreq on Orange Pi Plus. 2019-02-16 19:54:39 -08:00
Ben Hutchings 1d80b19d87 mt76: Use the correct hweight8() function (fixes FTBFS on ia64) 2019-02-12 15:39:34 +00:00
Salvatore Bonaccorso 5019a8394c HID: debug: fix the ring buffer implementation (CVE-2019-3819) 2019-02-09 15:14:06 +01:00
Salvatore Bonaccorso 00224672bb [x86] KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221) 2019-02-08 10:32:39 +01:00
Salvatore Bonaccorso fb1b32a316 [x86] KVM: work around leak of uninitialized stack contents (CVE-2019-7222) 2019-02-08 10:18:28 +01:00
Salvatore Bonaccorso 71aa687bf8 kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) 2019-02-08 10:01:58 +01:00
Ben Hutchings e898a5d96a Update "Revert "objtool: Fix CONFIG_STACK_VALIDATION=y warning for ..."
Part of the section we move was moved upstream in 4.19.15 by commit
ae206a1a5e3a "kbuild: fix false positive warning/error about missing
libelf".  Don't duplicate that section.
2019-02-07 23:09:25 +00:00
Ben Hutchings f6cfd5f990 Merge branch 'hrw-guest/linux-sid' into sid
Update to 4.19.20

See merge request kernel-team/linux!116
2019-02-07 21:00:43 +00:00
Ben Hutchings 886c02b804 percpu: convert spin_lock_irq to spin_lock_irqsave
This fixes boot failure with the alpha-generic flavour, discussed in
https://lists.debian.org/debian-alpha/2018/12/msg00001.html and
https://salsa.debian.org/kernel-team/linux/merge_requests/79
2019-02-06 23:41:18 +00:00
Marcin Juszkiewicz 8f73ffdafe Update to 4.19.20 2019-02-06 19:57:01 +00:00
Marcin Juszkiewicz 954102fe6b Update to 4.19.19 2019-02-06 19:57:01 +00:00
Salvatore Bonaccorso 86ff06cd73 [x86] kvmclock: set offset for kvm unstable clock
Closes: #918036
2019-01-30 17:14:36 +01:00
Yves-Alexis Perez fceb8a1734 update to 4.19.15 2019-01-16 11:09:49 +01:00
Yves-Alexis Perez bfc928ff1a update to 4.19.14 2019-01-16 11:09:26 +01:00
Salvatore Bonaccorso c2ac4cd321 posix-cpu-timers: Unbreak timer rearming
Closes: #919019
Closes: #919049
2019-01-12 11:25:48 +01:00
Salvatore Bonaccorso c91e16558f ipv6: Consider sk_bound_dev_if when binding a socket to an address
Closes: #918103
2019-01-04 10:33:34 +01:00
Yves-Alexis Perez f58750e12d smb3: fix large reads on encrypted connections 2019-01-02 10:39:19 +01:00
Ben Hutchings 3f9bd54247 Fix mangled patch "Build with -ffreestanding on m68k ..." 2018-12-31 19:42:29 +00:00
John Paul Adrian Glaubitz ce458bb4d5 [m68k] Add patch to build with -ffreestanding to fix FTBFS 2018-12-30 10:31:31 +01:00
Salvatore Bonaccorso fae8df0f68 Update to 4.19.13
Drop iomap-Revert-fs-iomap.c-get-put-the-page-in-iomap_pa.patch

Drop usb-hso-fix-oob-memory-access-in-hso_probe-hso_get_config_data.patch

Add bug closer for #917569

Cleanup debian/changelog file
2018-12-29 14:21:52 +01:00
Salvatore Bonaccorso 1c972fdf40 Update patch headers with git-format-patch-for-debian
Gbp-Dch: Ignore
2018-12-27 09:12:24 +01:00
Salvatore Bonaccorso 7fb96c41ce USB: hso: Fix OOB memory access in hso_probe/hso_get_config_data (CVE-2018-19985) 2018-12-27 09:00:59 +01:00
Ben Hutchings 217f4b61cc Add Forwarded field to powerpcspe build fix 2018-12-26 15:36:48 +00:00
Ben Hutchings 130a6a563b [riscv64] tools uapi: fix RISC-V 64-bit support
Apply Aurelien's patch instead of mine.
2018-12-26 01:44:33 +00:00
Ben Hutchings 6a75ed21c7 [powerpcspe] Fix -mcpu= options for SPE-only compiler 2018-12-26 00:06:02 +00:00
Ben Hutchings 64e3d0683d [riscv64] tools/include/.../bitsperlong.h: Add support for riscv 2018-12-25 23:02:20 +00:00
Ben Hutchings b051222e6d Change Origin fields for ena patches from bare commit hashes to URLs 2018-12-25 19:51:45 +00:00
Salvatore Bonaccorso 6886800dea iomap: Revert "fs/iomap.c: get/put the page in iomap_page_create/release()" 2018-12-21 23:14:53 +01:00
Salvatore Bonaccorso 6d099e7212 Update to 4.19.11
Drop ARM-dts-bcm2837-Fix-polarity-of-wifi-reset-GPIOs.patch

Cleanup debian/changelog file
2018-12-20 08:51:48 +01:00
Bastian Blank a484545688 Merge branch 'noahm/linux-4.19.5+ena202' into sid
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

See merge request kernel-team/linux!77
2018-12-18 21:14:09 +01:00
Uwe Kleine-König 12e23cb061 [arm] Fix reset polarity of the wifi device on Raspberry Pi 3 2018-12-18 20:32:51 +01:00
Noah Meyerhans 3024a2d70d drivers/net/ethernet/amazon: Backport v2.0.2 from Linux 4.20
Backport Amazon ENA ethernet driver version 2.0.2 from Linux 4.20

This mostly ammounts to cherry-picking the commits in the range described by
git log v4.19.5..v4.20-rc7 drivers/net/ethernet/amazon

Change e641e99f261f5203a911a9e0db54a214460d2cc4 introduced changes outside the
ena directory, but only removed a redundant #include and was trivial to scope
down.

Upstream dealt with merge conflicts in
d864991b220b7c62e81d21209e1fd978fd67352c; the resolution here was identical to
upstream.
2018-12-17 23:47:08 -08:00
Uwe Kleine-König a48b719088 [arm] Fix probing of 3rd gpio device on Armada 370. 2018-12-17 11:30:59 +01:00
Hans van Kranenburg 4d63e6ccbb [x86] Support booting a Xen PVH guest via Grub2
tl;dr: Xen PVH is the perfect upgrade path from PV and in combination
with grub2 support, it's the Xen "killer feature" we really should have
in Buster.

    Background info about Xen PVH:
https://wiki.xen.org/wiki/Virtualization_Spectrum#Almost_fully_PV:_PVH_mode

PVH mode in Xen, a.k.a. "HVM without having to run qemu" is a Xen guest
type best supported since Xen 4.11 and Linux kernel 4.17. Just like when
using PV mode, the guest does not have an emulated BIOS and the guest
kernel is directly started by the dom0. Buster will ship with Xen 4.11.

   Why is PVH interesting?

1. When the whole Meltdown/Spectre story started, it quickly became
apparent that 64-bit PV is the most problematic virtualization mode to
protect and to protect from, since address space from the hypervisor and
other guests (including dom0) is reachable from a 64-bit PV domU. To
mitigate this, XPTI (the Xen variant of PTI) has been implemented in the
hypervisor, but with a performance hit. HVM (so, also PVH) guests are
better isolated from the hypervisor and other guests. Inside the guest a
choice can be made about which mitigations to enable or not.  Also see
https://xenbits.xen.org/xsa/advisory-254.html

2. Unlike HVM, it's not needed to have a boot loader/sector, partitions,
and a qemu process in the dom0 (using cpu and memory and having an
attack surface).  Also, when running a largeish amount of domUs on a
physical server, not having all the qemu processes is an advantage.

3. Unlike PV, PVH makes use of all hardware features that accelerate
virtualization.

   The upgrade path from PV to PVH is super optimal. It's just setting
type='pvh' in the guest file and doing a full restart of the domU!

Unless... (insert Monty Python's Dramatic Chord!)

Unless... grub2 was used to boot the PV guests.

   Why is it interesting to be able to use grub?

Without using grub in between, the guest kernel and initrd have to be
copied out of the guest onto the dom0 filesystem, because the guest has
to be booted with them directly.  Currently, we already have the
grub-xen packages in Debian, which provide grub images which can be used
as kernel for a PV guest, after which it can load the actual linux
kernel that is symlinked from /vmlinuz on the guest filesystem at that
moment.

The final changes to the Linux kernel for grub+PVH are in Linux 4.20.
This request, to carry a few patches from Linux 4.20, provides one half
of the dots that need to be connected to make the full thing happen for
Buster.

Since we'll have Xen 4.11 in Buster, PVH is supported. The related grub2
patchset was committed to the grub master branch on Dec 12 2018 (yup,
today). So, I'll also start contacting the debian grub team soon to ask
(and help) to get the current grub-xen functionality in Debian to be
extended with PVH capabilities as well.

Test reports:
https://lists.xenproject.org/archives/html/xen-devel/2018-10/msg01913.html
https://lists.xenproject.org/archives/html/xen-devel/2018-11/msg03312.html
2018-12-14 16:55:04 +01:00
Salvatore Bonaccorso dfa9b24000 Update to 4.19.9
Drop vhost-vsock-fix-use-after-free-in-network-stack-call.patch

Cleanup debian/changelog file
2018-12-13 09:42:28 +01:00
Hans van Kranenburg edc7c6ee64 [x86] Fix booting as Xen dom0
This patch is from the tip repo, and will show up in 4.19 later.
2018-12-12 15:57:21 +01:00
Ben Hutchings 17d52832bc Merge branch 'libbpf-pr' into 'master'
Add libbpf0, libbpf-dev packages (#914428)

See merge request kernel-team/linux!74
2018-12-09 21:40:33 +00:00
Ben Hutchings a5cdd1f2cb Merge branch 'master' of salsa.debian.org:nsc-guest/linux 2018-12-08 18:58:30 +00:00
Salvatore Bonaccorso d7534bd9b6 vhost/vsock: fix use-after-free in network stack callers (CVE-2018-14625) 2018-12-08 15:40:45 +01:00
Hilko Bengen 4f1f7c5735 Add patches to build libbpf.so with SONAME, link against libelf 2018-12-08 15:02:05 +01:00
Nicolas Schier 3436e1c735
ovl: permit overlayfs mounts in user namespaces (Closes: #913880)
Permit overlayfs mounts within user namespaces to allow utilisation of e.g.
unprivileged LXC overlay snapshots.

Except by the Ubuntu community [1], overlayfs mounts in user namespaces are
expected to be a security risk [2] and thus are not enabled on upstream
Linux kernels.  For the non-Ubuntu users that have to stick to unprivileged
overlay-based LXCs, this meant to patch and compile the kernel manually.
Instead, adding the kernel tainting 'permit_mounts_in_userns' module
parameter allows a kind of a user-friendly way to enable the feature.

Testable with:

    sudo modprobe overlay permit_mounts_in_userns=1
    sudo sysctl -w kernel.unprivileged_userns_clone=1
    mkdir -p lower upper work mnt
    unshare --map-root-user --mount \
        mount -t overlay none mnt \
              -o lowerdir=lower,upperdir=upper,workdir=work

[1]: Ubuntu allows unprivileged mounting of overlay filesystem
https://lists.ubuntu.com/archives/kernel-team/2014-February/038091.html

[2]: User namespaces + overlayfs = root privileges
https://lwn.net/Articles/671641/

Signed-off-by: Nicolas Schier <nicolas@fjasle.eu>
2018-12-08 12:34:31 +00:00
Salvatore Bonaccorso 014c728272 Update to 4.19.8
Drop patches applied upstream in 4.19.8

Cleanup debian/changelog file

Add CVE id for CVE-2018-18397
2018-12-08 13:27:04 +01:00
Salvatore Bonaccorso 4237db03be blk-mq: punt failed direct issue to dispatch list 2018-12-08 11:28:12 +01:00
Salvatore Bonaccorso 771f295a0f blk-mq: fix corruption with direct issue
Closes: #915666
2018-12-06 17:39:15 +01:00
Romain Perier 5222653db6 Update to 4.19.7 2018-12-05 19:59:32 +01:00
Salvatore Bonaccorso 37094dbb55 [x86] KVM: LAPIC: Fix pv ipis use-before-initialization (CVE-2018-19406) 2018-12-03 21:11:24 +01:00
Ben Hutchings 64dab5b29a libcpupower: Hide private function and drop it from .symbols file
This avoids an FTBFS after this function was renamed in 4.19.6.
2018-12-02 19:23:13 +00:00
Ben Hutchings e6434a5655 Documentation/media: uapi: Explicitly say there are no Invariant Sections
Closes: #698668

This clarification has now been signed-off by the upstream authors.
2018-11-23 19:31:06 +00:00
Ben Hutchings c20b784198 Release linux (4.18.20-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAlv18cwACgkQ57/I7JWG
 EQnmrBAA0cIq67bC0g/calV1FyAnByc88h15W2BCN8+dD25PKRlsRsbSvQLx/E6J
 mEwPMu6bw/yJuIA8ADTFpjh4CmulBhQMC/cpQHy82F5umt/wNAPlhryDc0n96eRX
 bJfh3dzboyFEWBOSUgb6EWEdWZX1tMblf4ZpX1LfP5L/pJyq/Jz1xrpz31nGcz9E
 2m4mpovTAT2N34I9FF9PSuaYlPxljU/eZe7wyDmM+leMnmV4MGEOpV+CMNEohLsp
 8APxTJim6ZJXJ4ppl/Qk7yW1glTL3q5OqI+s5YB4RBKI4KBN/N3FF0PwWQ+L76bj
 B6b3nKT4PZA4V6Y6OEY8Q53NxjHmRJo5opG9Xp3Kr4HO0PZHH9Ih/YApaZipSDLg
 t3i/C05I/Jss2e6FZ5Ocx9L/nhzoEv9Lt0K2P6nxMJgc5U7lcTaiehcrVqQ2oBhO
 QZoEwUh9G8p5dnll/MTf3nj4UzZOimr2RSpktNT8w4kBEVAFFfZL5hGdk1UmBQTu
 peAPksjndtfjWvvzlhnWu3JoFMZ+J5yA8l7t8HwKI5yIlfJaM4QbjOb8YqsZQRNR
 qUxXxgn85o7QdSlCX/JFSK5fBxRphZHDtyWt9wTp1Ko0PjNtHLGv2oWj+SdvrJWu
 X0otIjqlEMMVCcZDlrzXboU6Cxae9FGXk6yzM5QfE1/D7F4tEuI=
 =E5AV
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.20-1'

Release linux (4.18.20-1).

* [rt] Drop all changes from 4.18-rt
* Drop added patches which are already in 4.19
* Drop ABI bump
2018-11-22 00:28:54 +00:00
Ben Hutchings 397f2ab6e1 Update to 4.19.3 2018-11-22 00:15:29 +00:00
Ben Hutchings 561dac67f3 Update to 4.18.20
* Drop patches applied upstream
* Refresh "arm64: add kernel config option to lock down when in Secure
  Boot mode"
2018-11-21 20:41:44 +00:00
Romain Perier 8008ae41de Update to 4.19.2 2018-11-16 21:22:52 +01:00
Salvatore Bonaccorso 7fb2e63e99 cdrom: fix improper type cast, which can leat to information leak (CVE-2018-18710) 2018-10-29 22:04:01 +01:00
Salvatore Bonaccorso 5f66f9439a mremap: properly flush TLB before releasing the page (CVE-2018-18281) 2018-10-29 22:01:56 +01:00
Romain Perier 540db7a99c Update to 4.18.14
This updates the debian changelog for listing changes of this stable
update, including removal of cherry picked commits applied on upstream.
2018-10-21 21:04:32 +02:00
Romain Perier 63b0a73429 Update to 4.18.13 2018-10-21 09:31:01 +02:00
Salvatore Bonaccorso 3448bce542 bpf: 32-bit RSH verification must truncate input before the ALU op (CVE-2018-18445) 2018-10-20 22:45:49 +02:00
Salvatore Bonaccorso b2e84defa2 [x86] swiotlb: Enable swiotlb for > 4GiG RAM on 32-bit kernels
Closes: #908924
2018-10-20 21:27:48 +02:00
Vagrant Cascadian 07cd30904b [arm64] Update pinebook/teres-i device-tree patches to 4.19.x:
- Enables the lid to wakeup from suspend.
2018-10-18 19:59:22 -07:00
Romain Perier 2c351aeb14 Update to 4.18.12
This updates to 4.18.12, including removal of applied upstream patches.
This also disables rt until 4.18.12-rt7 is integrated to this package
2018-10-15 20:14:39 +02:00
Romain Perier eba87a92ee Update to 4.18.11 2018-10-15 19:23:03 +02:00
Ben Hutchings 88995ec002 linux-perf: Fix BPF feature detection 2018-10-08 19:06:09 +01:00
Ben Hutchings a2764e86a2 Revert "uapi/linux/keyctl.h: don't use C++ reserved keyword as a struct member name"
Closes: #909813
2018-10-07 21:56:58 +01:00
Ben Hutchings 272a938bb7 xen-netback: fix input validation in xenvif_set_hash_mapping() (CVE-2018-15471) 2018-10-07 21:29:25 +01:00
Salvatore Bonaccorso 2db297e8f5 [arm64] KVM: Sanitize PSTATE.M when being set from userspace (CVE-2018-18021) 2018-10-07 08:37:42 +02:00
Salvatore Bonaccorso 20bad055e2 [arm64] KVM: Tighten guest core register access from userspace (CVE-2018-18021) 2018-10-07 08:30:32 +02:00
Ben Hutchings 79ecbb0832 Release linux (4.18.10-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluyLtYACgkQ57/I7JWG
 EQkvcBAAl2AxUxQKDRyS4mgohOa881NpHGdwfcxIXyEVIsPVVtUE+Dg5dzGku/J2
 C1iA6R8tbOZuxOWQbNkGTFZml3JjfcikH21EGD1aqq5z1PmRudA/XBXdl2aItMUi
 lV6HMQcG4GWTjMC/cwrxW5D7rrIqGfp+CCAiACheGbK7mrwAwpioCP3u4JUQm0+F
 kGU4znfQbCScXtoegAwRBHB5nUWRbKZMHMe4vNgVl4Na5wTy4dL4Eh3qWulwOzGx
 94OiJPsV9thctA6vusqrub5DpABjQveDPJyHt2EgvAt2W8MrE/NUiU+4ol2tTNcT
 Ev4P66Jz2bmr3pisx5Cz+3fUXcesrllvWJx5RxPV8f4gCj4/A3zNNz0UdcqcIR/h
 ptTMM9fDC8srz6bnKSYWSii3cmnxMVx5OjNztaoeJMFY6M7rn58rW9e53pkVWeJf
 eKZ27T7RvNMoGDr99u10ca+zb8qBygxQBQea1rKL49T2Jl/5ROkkPvoQ0SNT5kIe
 DL9Z7MDwBI5H5kQW7e9jCiOH65PG/DeVwddko3FeHQy9INxgd6toKiiU0HM4U+8Y
 lsUbuAHRHeVsuLQ1U5YTFHrG56CjqYeU10A7UnxRbqvIOd2MTfp/4fAcM4X+15yZ
 2Q1MRd/fCXIlRBMGfGRnNMX9327/I+XQ8kamktE5H55JWF+KyeI=
 =eMi7
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.10-1'

Release linux (4.18.10-1).

- Drop new patches that are already included upstream
- Keep ABI number set to "trunk"
- Refresh arm64 APEI workaround patch for 4.19
2018-10-01 15:37:28 +01:00
Romain Perier 14d9845760 Update to 4.18.10
This updates the debian changelog for listing changes of this stable
update. It also removes patches applied upstream and refreshes a patch
that is part of 4.18.7-rt5.
2018-09-30 16:01:44 +02:00
Salvatore Bonaccorso 7b1a277680 scsi: target: iscsi: Use bin2hex instead of a re-implementation 2018-09-27 21:20:47 +02:00
Salvatore Bonaccorso 7ceb71a555 scsi: target: iscsi: Use hex2bin instead of a re-implementation (CVE-2018-14633) 2018-09-27 21:19:15 +02:00
Romain Perier 1353758acf Update to 4.19-rc5
This updates the changelogs and removes patches that have been applied
upstream.
2018-09-26 12:17:37 +02:00
Ben Hutchings f81ec680a5 Bump ABI to 2
- Drop ABI reference files and ABI maintenance patch
- Delete claim that ignoring ABI changes is a build fix
2018-09-25 22:22:56 +01:00
Ben Hutchings 5a77952e41 [i386/686] Enable MGEODE_LX instead of M686 (regression in 4.16)
- x86-32: Disable 3D-Now in generic config
2018-09-25 21:55:43 +01:00
Romain Perier 5ea1715db4 Update to 4.18.9
This updates the debian changelog for listing changes of this stable
update. It also removes patches applied upstream and refreshes a patch
that is part of 4.18.7-rt5.
2018-09-23 20:00:57 +02:00
Salvatore Bonaccorso d112adae70 f2fs: fix to do sanity check with secs_per_zone (CVE-2018-13100) 2018-09-22 17:31:48 +02:00
Salvatore Bonaccorso 310f694a6b f2fs: fix to do sanity check with reserved blkaddr of inline inode (CVE-2018-13099) 2018-09-22 17:28:29 +02:00
Salvatore Bonaccorso f46ed6ff17 floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (CVE-2018-7755) 2018-09-22 17:11:42 +02:00
Geoff Levand bf27abcb1c Add fixup for HPE m400 APEI firmware problems
Signed-off-by: Geoff Levand <geoff@infradead.org>

[bwh: Add Forwarded field and note the patch in debian/changelog]
2018-09-21 18:34:18 +01:00
Ben Hutchings 337682dc35 Release linux (4.18.8-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluhDZUACgkQ57/I7JWG
 EQkLvQ//QqqAfJXjwZt3Iy+dcYieLqmhy4/KtjVvFP8EKSyfdeWl0awb3szbmMs5
 cy2p5q17mafVZTx9MCppp4y1modMBZrMC6hmB9UAoU0j1GnKHNbtddzA3+uo1dmw
 i2LudGseb8LSL5z6g95P4SozSNNeFPIOLSYxkGVnlG3sUdlhlRYCvYf9k8BKUEbx
 sU0yDXQOhf0kBLsRXW8QfJEBHv5ivr9/Q+s9e71NUpVWaEOZwgfJacM/QWcY8+J4
 2o0XlHtS9+r0Ik0RK5Zyt8eun1sH1cb4Lta9LZjvRLWpCqXNpPSus6V8qENngcyw
 X9ZGWi3nMiR4OOuEMGMxbzXXzWreg9MNPyM5/kVfJKlsLi1xP7ufhnstR+j2/tTJ
 guVLDw73B4RyOwH2p4Kh1Pk0hACagI9AeKfjSBTMMlv2rD6FDfuJlSgEYUIK/NLl
 lsefkkKu2EZVdhIBEGDnu80+V2AuoTYXpEknvbnvlYZ1wLNXb73GIFptWu18dfOy
 fZ4cEWDxuKd52nbsjKlQmaxlFGSfjmmWliorhrU84FZsRjvFARGWWPwnjk8fwcpD
 +D0GASqx37iw1gQK8yNQER3dxHzVh1blIKhADgEWJXsaeHcfyDHziShX7FZ8n6G5
 HQBaynaG0Qc9fWd8O6xmX6wsP/vGRFJchbWwa5Gd7L2cCmur1Vk=
 =lopf
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.8-1'

Release linux (4.18.8-1).

- Drop ABI reference files and ABI maintenance patch
- Replace ccp driver patch with upstream version that applies to 4.19
2018-09-18 15:49:53 +01:00
Ben Hutchings ee7d2e20ff Update to 4.18.8
- Drop security fixes included in it
- mm: Avoid ABI change in 4.18.7
2018-09-17 01:13:52 +01:00
Ben Hutchings 70cbc7d0ea Update to 4.19-rc4
Drop lockdep build fixes that were applied or obsoleted upstream.
2018-09-16 23:17:20 +01:00
Ben Hutchings cdba06ffc2 debian/patches: Add Forwarded fields to several patches 2018-09-16 16:27:59 +01:00
Ben Hutchings 841b031a9f Revert "Revert "net: increase fragment memory usage limits""
4.19 includes a better fix for CVE-2018-5391.
2018-09-16 16:20:13 +01:00
Ben Hutchings d7423140dd Revert "i40e: Add kconfig dependency to ensure cmpxchg64() is available"
The bug that prompted this was fixed upstream in 4.17 by commit
8f769dd14a43 "i40e: re-number feature flags to remove gaps".
2018-09-16 16:13:00 +01:00
Romain Perier 2943a959c9 [x86] crypto: ccp: add timeout support in the SEV command (Closes: #908248) 2018-09-16 01:58:12 +01:00
Romain Perier 21f4f386c3 Update to 4.18.7
This updates the debian changelog for listing changes of this stable
update. It also removes patches that have been applied upstream.
2018-09-15 20:27:11 +01:00
Salvatore Bonaccorso f21b10d326 hfsplus: fix NULL dereference in hfsplus_lookup() (CVE-2018-14617) 2018-09-15 11:27:16 +02:00
Salvatore Bonaccorso f84af2d0a0 btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (CVE-2018-14609) 2018-09-15 11:19:09 +02:00
Ben Hutchings 26224f8bb8 Move featureset patches and series file to debian/patches-<featureset>.
Fixes lintian warning patch-file-present-but-not-mentioned-in-series.

Also preparation for using dgit, which will remove everything except
the main patch series under debian/patches.
2018-09-13 01:52:52 +01:00
Ben Hutchings 07b57afec5 Move all patch generation scripts to debian/bin
Rename them to genpatch-{aufs,lockdown,rt}

Fixes lintian warning patch-file-present-but-not-mentioned-in-series.

Also preparation for using dgit, which will remove everything except
the main patch series under debian/patches.
2018-09-13 01:52:36 +01:00
Salvatore Bonaccorso e3cee898ab mac80211: don't update the PM state of a peer upon a multicast frame
Closes: #887045
Closes: #886292
2018-09-12 22:31:37 +02:00
Ben Hutchings 824debfd2e tools: turbostat: Add checks for failure of fgets() and fscanf() 2018-09-11 04:17:46 +01:00
Ben Hutchings 605745f58f tools: x86_energy_perf_policy: Fix "uninitialized variable" warnings at -O2 2018-09-11 04:17:45 +01:00
Ben Hutchings 70e8277e19 aufs: Update support patchset to aufs4.x-rcN 20180910 2018-09-10 20:13:33 +01:00
Ben Hutchings ea499d401a Update to 4.19-rc3 2018-09-10 14:55:03 +01:00
Ben Hutchings 2b6dda36d9 Release linux (4.18.6-1).
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAluRd+AACgkQ57/I7JWG
 EQlP0w/7BNDTGlfeiOzIY0XoW6gdVjRMN3jxGbZH/3mcF0ZcF+qkIpUAOYH7gcTC
 EM/LqbG4epHsdNo8A91TzcD05/GD3h4AIwi/ibecsfNDOUM9FfL7X/PGy5OoAvxR
 82mY0dK8I5n4dhSa09RUQtDSd/Tg4tOKITCosRdaB5DE9jT/jFG86kBFghkPORKQ
 UDOVAzIcFpCemJJDeEtAN5kkapvJvSSALG+B+upVNcO5w9IMylOEFSyEkukywYDm
 W8Oy8Xe/I6wC7rUdayXueGU8JLAoChtoWHe8WkLb0Gbuuw3ZEVLnltL98S0N/9R+
 tjbmIRleRK3LI7dOn7YvcBpfjSsoKIgl9uS6j0ILKEY4LAoGeNKDxepqLrw2MPM4
 yXULjzj6OQVkY6nh4wc9A9NRRTGbUzCTnrnitkmzfM0c8p3IZ29xVvSYjBIL117O
 L1bRXwt0RiVgxVkaI+TdqtvDI2wN8DEk222has7EOz0AqMZ0Il9VhFaIrRU2m/4l
 89bEU4WPMgcfSCBiT7lQV37ngT/L8odZ85HaqHyqBO63oOI5MkJmOE078tm+xsq/
 BzwnNbuFlX99jSj28ZFbUPNUBq/Lqrh9mKqL6rZ82YK5zdhWeh2ejgLWrC9nIex1
 rmjzgFV7lQ+5O5c5+01BKvNXCFPbVhN1unk4ocm40XzbTmIOsn4=
 =71I/
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.18.6-1'

Release linux (4.18.6-1).
2018-09-06 19:56:32 +01:00
Ben Hutchings 0b9c0ab67c [rt] Refresh patches and re-enable 2018-09-06 15:27:51 +01:00
Romain Perier 428a3d136e Update to 4.18.6 2018-09-06 08:07:27 +02:00
Ben Hutchings c74e5d6fe7 [x86] boot: Fix EFI stub alignment 2018-09-05 17:55:25 +01:00
Ben Hutchings 295116a6db [powerpc*] boot: Fix missing crc32poly.h when building with KERNEL_XZ (fixes FTBFS) 2018-09-05 02:48:16 +01:00
Ben Hutchings c3b8d670c3 Update to 4.19-rc2 2018-09-03 21:34:30 +01:00
Ben Hutchings 1b231c6fe7 Merge branch 'sid' 2018-09-03 21:15:44 +01:00
Romain Perier d51682713e [rt] Update to 4.18.5-rt3 2018-08-31 17:16:36 +02:00
Ben Hutchings 5ad4d97be9 [x86] Allow generating user-space headers without a compiler 2018-08-30 16:06:25 +01:00
Ben Hutchings d87efc40a0 Update descriptions and add Forwarded fields for liblockdep build fixes 2018-08-29 00:39:50 +01:00
Ben Hutchings d34b1c8943 locking/lockdep: Delete unnecesary #include (fixes liblockdep build) 2018-08-28 22:07:54 +01:00
Vagrant Cascadian a14954b79e Remove stray pinebook comment in debian/patches/series. 2018-08-27 16:16:43 -07:00
Ben Hutchings daab6c7f7d Merge branch 'sid'
But don't enable the rt featureset.
2018-08-27 18:33:21 +01:00
Ben Hutchings c8c103a72c aufs: Update support patchset to aufs4.18-20180827 (no functional change) 2018-08-27 15:38:40 +01:00
Ben Hutchings 9d3878242c [rt] Update to 4.18-rc8-rt1 and re-enable 2018-08-27 15:32:32 +01:00
Ben Hutchings e2fa147f31 [rt] Restore genpatch.py script
This was mistakenly removed by commit 055a1807cb ("Drop RT patch").
2018-08-27 15:26:28 +01:00
Ben Hutchings 54cc69a744 Update to 4.19-rc1
- Drop/refresh patches as appropriate
- Disable aufs patches until they are updated upstream
2018-08-27 15:21:43 +01:00
Ben Hutchings d6c050378d Release linux (4.17.17-1).
-----BEGIN PGP SIGNATURE-----
 
 iQKmBAABCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlt4FyhfFIAAAAAALgAo
 aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
 ZWJpYW4ub3JnAAoJEAVMuPMTQ89EitQQAJ4S3n+2azIKz50gfxon0dgS9ybXRxeb
 2Hk/FzBXqFduVhWe9vVuZdE4ko5QsQ8ht2HR726kcEkud8pFOh0pt/7Q67IQHbQN
 t/hD3C2C6M8pKhwBEwuSZtRqsruqv3qll95xbwIqW7AWP+/AODQltzgB0AplpC6a
 8ED1nCxutDI0WrzN76UcfYxa1slRJ9sRfh+KRWQSEsU+jCSP0aD0rArYVeppXGaR
 cAy5Xku7237hFdeIzlt6goHuvfDuSlbAxpuaF944TVFtmPYwe7W+S3rRSy0OtjQY
 WzdSsIKXlXVMkMJD4t3ybFUMOyHP/jT79Tem0kp8EBn8NcPjtnLJYLiODVR0PH3A
 5XOEzR3NLGspDxkEJWdq/7IsLL4a7wVLAYn5VbkRVzo2Jxp6IpSqPrFjYwdf/KMF
 PizvbJtHTQxGFk6jPdCG+DV9hBrMOzXedcqH24qZ4yr6xUOj5WICR3+9E57DYLwH
 oJzXef8BKhx4MdkDduduyWcyWJvlH2nBae2T+q+4mwfI/I+8PeyUDnSc7Hmzx1Cc
 feeeccvQPrhnu8HAE0RmfF1YhfyXXq3GQEt4MaV5Z2h6aAS1zxm1EhBueJMeaEhh
 i6oldiPDd2qHX9rZXYLvUx109qLyTiqxbzCgJCAF3s8Bk7P/Aj/0mDADo7d5V0TY
 KsXydFzhoiTZ
 =Qmdt
 -----END PGP SIGNATURE-----

Merge tag 'debian/4.17.17-1'

Release linux (4.17.17-1).

- Drop "gpu: host1x: Fix compiler errors by converting to dma_addr_t"
  which is already in 4.18
- Drop ABI reference files and ABI number change
2018-08-27 14:15:27 +01:00
Ben Hutchings 9d953ac0e1 Fix fuzz in "video: Remove nvidiafb and rivafb"
Surprisingly. quilt (and presumably diff) accepts a context line
starting with "\t" that should start with " \t".
2018-08-26 16:50:43 +01:00
Salvatore Bonaccorso 66fce4cbfe Update to 4.17.16
Drop x86-l1tf-fix-build-error-seen-if-config_kvm_intel-is-disabled.patch

Drop x86-i8259-add-missing-include-file.patch

Drop bluetooth-hidp-buffer-overflow-in-hidp_process_report.patch

Cleanup debian/changelog file
2018-08-18 12:22:37 +02:00
Salvatore Bonaccorso cfd1f69cfe Bluetooth: hidp: buffer overflow in hidp_process_report (CVE-2018-9363) 2018-08-16 21:28:17 +02:00
Salvatore Bonaccorso f7fa757621 [x86] i8259: Add missing include file 2018-08-16 21:18:18 +02:00
Salvatore Bonaccorso 757e7a9cb1 l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled 2018-08-16 07:26:32 +02:00
Ben Hutchings e090a7f60d Revert "net: increase fragment memory usage limits" (CVE-2018-5391) 2018-08-14 22:23:59 +01:00
Bastian Blank 2fcc01b384 Bump ABI to 2 2018-08-13 14:02:22 +02:00
Romain Perier f813b6ebf5 Update to 4.17.14
This updates the debian changelog for listing changes of this stable
update. It also removes patches that have been applied upstream.
2018-08-13 14:01:38 +02:00