[continued from previous message]
(2021-04-09) on buxtehude.debian.org
X-Spam-Level:
X-Spam-Status: No, score=-103.0 required=4.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,FOURLA,FVGT_m_MULTI_ODD,HAS_BUG_NUMBER,
MD5_SHA1_SUM,META_ATTENDEES_DBSPAM1,PGPSIGNATURE,
RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,SPF_HELO_PASS,SPF_NONE,
USER_IN_DKIM_WELCOMELIST,USER_IN_DKIM_WHITELIST autolearn=no
autolearn_force=no version=3.4.6-bugs.debian.org_2005_01_02 X-Spam-Bayes: score:0.0000 Tokens: new, 258; hammy, 150; neutral, 619; spammy,
0. spammytokens: hammytokens:0.000-+--HX-Debian:DAK,
0.000-+--H*rp:D*ftp-master.debian.org, 0.000-+--UD:debian.tar.xz,
0.000-+--H*r:sk:fasolo., 0.000-+--Hx-spam-relays-external:sk:fasolo. Return-path: <
envelope@ftp-master.debian.org>
Received: from mailly.debian.org ([2001:41b8:202:deb:6564:a62:52c3:4b72]:58800)
from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP CA,CN=mailly.debian.org,EMAIL=
hostmaster@mailly.debian.org (verified)
by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
(Exim 4.94.2)
(envelope-from <
envelope@ftp-master.debian.org>)
id 1uCj6D-00DZ2X-Bf
for
1103277-close@bugs.debian.org; Wed, 07 May 2025 18:02:29 +0000 Received: from [192.91.235.231] (port=36258 helo=fasolo.debian.org)
from C=NA,ST=NA,L=Ankh Morpork,O=Debian SMTP,OU=Debian SMTP CA,CN=fasolo.debian.org,EMAIL=
hostmaster@fasolo.debian.org (verified)
by mailly.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
(Exim 4.94.2)
(envelope-from <
envelope@ftp-master.debian.org>)
id 1uCj6B-0079mN-5p
for
1103277-close@bugs.debian.org; Wed, 07 May 2025 18:02:27 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id:Content-Type:
Subject:MIME-Version:To:Reply-To:From:Cc:Content-Transfer-Encoding:Content-ID
:Content-Description:In-Reply-To:References;
bh=I6oklh6KeJ4sZMyZaQuiYMIiNMUQyau6a9S5CKLQmcM=; b=AO/SrLke1YYgGB5PACBQNQ7Zg8
vakWtXG2Zj5oCvfN9mUZCGRb1dtjuqpzh0R8n8XEndRT1jyP+jVwQC24v6EXjKsxN5uKeraD0p5rC
PyHF5IlJ9aDVdOEMtnwecxJ6CKMkqJaZFivie3rwFxNTMsUcP+8fFAXzpU2+PEwhqkiu+aNSrBEL6
GYOx6FsPB+O0FhDfFDe79tEnc0g5oATX79+3Rfn/4vc6YdvShjbESFvcNFgQCqbpuv6iYdWaQXy1L
up/+jO080vbeqCInRh9YhtzD0zYPJBJG4kg1QSWRfkMWYIey2EBJx6uFfHTn2aqDxDBgkDZGZwRGV
03SNRAqQ==;
Received: from dak by fasolo.debian.org with local (Exim 4.94.2)
(envelope-from <
envelope@ftp-master.debian.org>)
id 1uCj6A-00EMBJ-1A; Wed, 07 May 2025 18:02:26 +0000
From: Debian FTP Masters <
ftpmaster@ftp-master.debian.org>
Reply-To: Salvatore Bonaccorso <
carnil@debian.org>
To:
1103277-close@bugs.debian.org
X-DAK: dak process-policy
X-Debian: DAK
X-Debian-Package: linux
Debian: DAK
Debian-Changes: linux_6.1.137-1_source.changes
Debian-Source: linux
Debian-Version: 6.1.137-1
Debian-Architecture: source
Debian-Suite: proposed-updates
Debian-Archive-Action: accept
MIME-Version: 1.0
Subject: Bug#1103277: fixed in linux 6.1.137-1
Content-Type: multipart/signed; micalg="pgp-sha256";
protocol="application/pgp-signature";
boundary="===============4317700789247981710=="
Message-Id: <
E1uCj6A-00EMBJ-1A@fasolo.debian.org>
Date: Wed, 07 May 2025 18:02:26 +0000
--===============4317700789247981710==
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Source: linux
Source-Version: 6.1.137-1
Done: Salvatore Bonaccorso <
carnil@debian.org>
We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to
1103277@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Salvatore Bonaccorso <
carnil@debian.org> (supplier of updated linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 07 May 2025 17:10:56 +0200
Source: linux
Architecture: source
Version: 6.1.137-1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team <
debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <
carnil@debian.org>
Closes: 956226 1103277 1104460 1104511
Changes:
linux (6.1.137-1) bookworm; urgency=medium
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.136
- module: sign with sha512 instead of sha1 by default
- tracing: Add __cpumask to denote a trace event field that is a cpumask_t
- tracing: Fix cpumask() example typo
- tracing: Add __string_len() example
- tracing: Add __print_dynamic_array() helper
- tracing: Verify event formats that have "%*p.."
- [arm64,armhf] net: dsa: mv88e6xxx: don't dispose of Global2 IRQ mappings
from mdiobus code
- [arm64,armhf] net: dsa: add support for mac_prepare() and mac_finish()
calls
- [arm64,armhf] net: dsa: mv88e6xxx: move link forcing to
mac_prepare/mac_finish
- [arm64,armhf] net: dsa: mv88e6xxx: pass directly chip structure to
mv88e6xxx_phy_is_internal
- [arm64,armhf] net: dsa: mv88e6xxx: add field to specify internal phys
layout
- [arm64,armhf] net: dsa: mv88e6xxx: fix internal PHYs for 6320 family
- [arm64,armhf] net: dsa: mv88e6xxx: fix VTU methods for 6320 family
- iio: adc: ad7768-1: Move setting of val a bit later to avoid unnecessary
return value check
- iio: adc: ad7768-1: Fix conversion result sign
- [arm64] backlight: led_bl: Convert to platform remove callback returning
void
- [arm64] backlight: led_bl: Hold led_access lock when calling
led_sysfs_disable() (CVE-2025-23144)
- of: resolver: Simplify of_resolve_phandles() using __free()
- of: resolver: Fix device node refcount leakage in of_resolve_phandles()
- PCI: Assign PCI domain IDs by ida_alloc()
- PCI: Fix reference leak in pci_register_host_bridge()
- ASoC: qcom: q6dsp: add support to more display ports
- ASoC: qcom: Fix sc7280 lpass potential buffer overflow
- dma/contiguous: avoid warning about unused size_bytes
- [arm64] cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
- [arm64] cpufreq: cppc: Fix invalid return value in .get() callback
- btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range()
- scsi: core: Clear flags for scsi_cmnd that did not complete
- net: lwtunnel: disable BHs when required
- net: phy: leds: fix memory leak
- tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
- net_sched: hfsc: Fix a UAF vulnerability in class handling
(CVE-2025-37797)
- net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
- [amd64] iommu/amd: Return an error if vCPU affinity is set for non-vCPU
IRTE
- [x86] perf/x86: Fix non-sampling (counting) events on certain x86
platforms
- wifi: mac80211: export ieee80211_purge_tx_queue() for drivers
- wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb
- virtio_console: fix missing byte order handling for cols and rows
[continued in next message]
--- SoupGate-Win32 v1.05
* Origin: you cannot sedate... all the things you hate (1:229/2)