• Bug#1103277: marked as done (linux: CVE-2024-38541 for 6.1 branch) (2/4

    From Debian Bug Tracking System@1:229/2 to All on Wed May 7 20:10:01 2025
    [continued from previous message]

    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-103.0 required=4.0 tests=BAYES_00,DKIM_SIGNED,
    DKIM_VALID,DKIM_VALID_AU,FOURLA,FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,
    MD5_SHA1_SUM,META_ATTENDEES_DBSPAM1,PGPSIGNATURE,
    RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,SPF_HELO_PASS,SPF_NONE,
    USER_IN_DKIM_WELCOMELIST,USER_IN_DKIM_WHITELIST autolearn=no
    autolearn_force=no version=3.4.6-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 258; hammy, 150; neutral, 619; spammy,
    0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK,
    0.000-+--H*rp:D*ftp-master.debian.org, 0.000-+--UD:debian.tar.xz,
    0.000-+--H*r:sk:fasolo., 0.000-+--Hx-spam-relays-external:sk:fasolo. Return-path: <envelope@ftp-master.debian.org>
    Received: from mailly.debian.org ([2001:41b8:202:deb:6564:a62:52c3:4b72]:58800)
    from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP CA,CN=mailly.debian.org,EMAIL=hostmaster@mailly.debian.org (verified)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
    (Exim 4.94.2)
    (envelope-from <envelope@ftp-master.debian.org>)
    id 1uCj6D-00DZ2X-Bf
    for 1103277-close@bugs.debian.org; Wed, 07 May 2025 18:02:29 +0000 Received: from [192.91.235.231] (port=36258 helo=fasolo.debian.org)
    from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP CA,CN=fasolo.debian.org,EMAIL=hostmaster@fasolo.debian.org (verified)
    by mailly.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
    (Exim 4.94.2)
    (envelope-from <envelope@ftp-master.debian.org>)
    id 1uCj6B-0079mN-5p
    for 1103277-close@bugs.debian.org; Wed, 07 May 2025 18:02:27 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
    d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id:Content-Type:
    Subject:MIME-Version:To:Reply-To:From:Cc:Content-Transfer-Encoding:Content-ID
    :Content-Description:In-Reply-To:References;
    bh=I6oklh6KeJ4sZMyZaQuiYMIiNMUQyau6a9S5CKLQmcM=; b=AO/SrLke1YYgGB5PACBQNQ7Zg8
    vakWtXG2Zj5oCvfN9mUZCGRb1dtjuqpzh0R8n8XEndRT1jyP+jVwQC24v6EXjKsxN5uKeraD0p5rC
    PyHF5IlJ9aDVdOEMtnwecxJ6CKMkqJaZFivie3rwFxNTMsUcP+8fFAXzpU2+PEwhqkiu+aNSrBEL6
    GYOx6FsPB+O0FhDfFDe79tEnc0g5oATX79+3Rfn/4vc6YdvShjbESFvcNFgQCqbpuv6iYdWaQXy1L
    up/+jO080vbeqCInRh9YhtzD0zYPJBJG4kg1QSWRfkMWYIey2EBJx6uFfHTn2aqDxDBgkDZGZwRGV
    03SNRAqQ==;
    Received: from dak by fasolo.debian.org with local (Exim 4.94.2)
    (envelope-from <envelope@ftp-master.debian.org>)
    id 1uCj6A-00EMBJ-1A; Wed, 07 May 2025 18:02:26 +0000
    From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
    Reply-To: Salvatore Bonaccorso <carnil@debian.org>
    To: 1103277-close@bugs.debian.org
    X-DAK: dak process-policy
    X-Debian: DAK
    X-Debian-Package: linux
    Debian: DAK
    Debian-Changes: linux_6.1.137-1_source.changes
    Debian-Source: linux
    Debian-Version: 6.1.137-1
    Debian-Architecture: source
    Debian-Suite: proposed-updates
    Debian-Archive-Action: accept
    MIME-Version: 1.0
    Subject: Bug#1103277: fixed in linux 6.1.137-1
    Content-Type: multipart/signed; micalg="pgp-sha256";
    protocol="application/pgp-signature";
    boundary="===============4317700789247981710=="
    Message-Id: <E1uCj6A-00EMBJ-1A@fasolo.debian.org>
    Date: Wed, 07 May 2025 18:02:26 +0000

    --===============4317700789247981710==
    Content-Type: text/plain; charset="utf-8"
    Content-Transfer-Encoding: quoted-printable

    Source: linux
    Source-Version: 6.1.137-1
    Done: Salvatore Bonaccorso <carnil@debian.org>

    We believe that the bug you reported is fixed in the latest version of
    linux, which is due to be installed in the Debian FTP archive.

    A summary of the changes between this version and the previous one is
    attached.

    Thank you for reporting the bug, which will now be closed. If you
    have further comments please address them to 1103277@bugs.debian.org,
    and the maintainer will reopen the bug report if appropriate.

    Debian distribution maintenance software
    pp.
    Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

    (This message was generated automatically at their request; if you
    believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org)


    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    Format: 1.8
    Date: Wed, 07 May 2025 17:10:56 +0200
    Source: linux
    Architecture: source
    Version: 6.1.137-1
    Distribution: bookworm
    Urgency: medium
    Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
    Changed-By: Salvatore Bonaccorso <carnil@debian.org>
    Closes: 956226 1103277 1104460 1104511
    Changes:
    linux (6.1.137-1) bookworm; urgency=medium
    .
    * New upstream stable update:
    https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.136
    - module: sign with sha512 instead of sha1 by default
    - tracing: Add __cpumask to denote a trace event field that is a cpumask_t
    - tracing: Fix cpumask() example typo
    - tracing: Add __string_len() example
    - tracing: Add __print_dynamic_array() helper
    - tracing: Verify event formats that have "%*p.."
    - [arm64,armhf] net: dsa: mv88e6xxx: don't dispose of Global2 IRQ mappings
    from mdiobus code
    - [arm64,armhf] net: dsa: add support for mac_prepare() and mac_finish()
    calls
    - [arm64,armhf] net: dsa: mv88e6xxx: move link forcing to
    mac_prepare/mac_finish
    - [arm64,armhf] net: dsa: mv88e6xxx: pass directly chip structure to
    mv88e6xxx_phy_is_internal
    - [arm64,armhf] net: dsa: mv88e6xxx: add field to specify internal phys
    layout
    - [arm64,armhf] net: dsa: mv88e6xxx: fix internal PHYs for 6320 family
    - [arm64,armhf] net: dsa: mv88e6xxx: fix VTU methods for 6320 family
    - iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary
    return value check
    - iio: adc: ad7768-1: Fix conversion result sign
    - [arm64] backlight: led_bl: Convert to platform remove callback returning
    void
    - [arm64] backlight: led_bl: Hold led_access lock when calling
    led_sysfs_disable() (CVE-2025-23144)
    - of: resolver: Simplify of_resolve_phandles() using __free()
    - of: resolver: Fix device node refcount leakage in of_resolve_phandles()
    - PCI: Assign PCI domain IDs by ida_alloc()
    - PCI: Fix reference leak in pci_register_host_bridge()
    - ASoC: qcom: q6dsp: add support to more display ports
    - ASoC: qcom: Fix sc7280 lpass potential buffer overflow
    - dma/contiguous: avoid warning about unused size_bytes
    - [arm64] cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
    - [arm64] cpufreq: cppc: Fix invalid return value in .get() callback
    - btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range()
    - scsi: core: Clear flags for scsi_cmnd that did not complete
    - net: lwtunnel: disable BHs when required
    - net: phy: leds: fix memory leak
    - tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
    - net_sched: hfsc: Fix a UAF vulnerability in class handling
    (CVE-2025-37797)
    - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
    - [amd64] iommu/amd: Return an error if vCPU affinity is set for non-vCPU
    IRTE
    - [x86] perf/x86: Fix non-sampling (counting) events on certain x86
    platforms
    - wifi: mac80211: export ieee80211_purge_tx_queue() for drivers
    - wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb
    - virtio_console: fix missing byte order handling for cols and rows

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: you cannot sedate... all the things you hate (1:229/2)