Accepted linux-signed-amd64 5.10.179+1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted linux-signed-amd64 5.10.179+1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 14 May 2023 17:20:31 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-amd64_5.10.179+1_source.changes
- Debian-source: linux-signed-amd64
- Debian-suite: proposed-updates
- Debian-version: 5.10.179+1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=4OpmrJ9yes3YRQUUew7aOSQj+SHxWpUPl2OBca7zulw=; b=VDYu8O01pJpdD0r+T7Ra/tpQ/b bBYpcQAb0pZrlterpIAW7Qzc4uJpQkmpi86OQA5wzLfn37pksKxzmgxiwDIyMUoE0kps/gzHkcJy8 pv1vGnrtW+qijwCUdMcPIIeVdukmtvqoEI92+ZusbyolNuGKbngSIlQlSglzqgatCY+6B6sFus4Ep HDNeOc/qxlAQvidvLcc5Jy7Y42xPSC6o548e4TjnMfezmcTCdK2d8hIHYeCuDTmLnQWkEgN7XW4dp uSqD2JXCuWaR1CdjOP++HEIMrWo2KgLyKaBqeSxdEN71g+ShY4rzjscp6R5/M3BWJIKZC4IaV0jrM Ze486iqQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pyFOZ-004I84-9Z@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 12 May 2023 06:08:40 +0200
Source: linux-signed-amd64
Architecture: source
Version: 5.10.179+1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-amd64 (5.10.179+1) bullseye-security; urgency=high
.
* Sign kernel from linux 5.10.179-1
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.179
- [arm64] dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node
- netfilter: br_netfilter: fix recent physdev match breakage
- [arm64,armhf] regulator: fan53555: Explicitly include bits header
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
(CVE-2023-31436)
- virtio_net: bugfix overflow inside xdp_linearize_page()
- sfc: Split STATE_READY in to STATE_NET_DOWN and STATE_NET_UP.
- sfc: Fix use-after-free due to selftest_work
- netfilter: nf_tables: fix ifdef to also consider nf_tables=m
- i40e: fix accessing vsi->active_filters without holding lock
- i40e: fix i40e_setup_misc_vector() error handling
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next()
- net: rpl: fix rpl header size calculation
- bpf: Fix incorrect verifier pruning due to missing register precision
taints
- e1000e: Disable TSO on i219-LM card to increase speed
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event
- Input: i8042 - add quirk for Fujitsu Lifebook A574/H
- scsi: megaraid_sas: Fix fw_crash_buffer_show()
- scsi: core: Improve scsi_vpd_inquiry() checks
- [s390x] ptrace: fix PTRACE_GET_LAST_BREAK error handling
- nvme-tcp: fix a possible UAF when failing to allocate an io queue
- xen/netback: use same error messages for same errors
- xfs: drop submit side trans alloc for append ioends
- iio: light: tsl2772: fix reading proximity-diodes from device tree
- nilfs2: initialize unused bytes in segment summary blocks
- memstick: fix memory leak if card device is never registered
- kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- mm/khugepaged: check again on anon uffd-wp during isolation
- sched/uclamp: Make task_fits_capacity() use util_fits_cpu()
- sched/uclamp: Fix fits_capacity() check in feec()
- sched/uclamp: Make select_idle_capacity() use util_fits_cpu()
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu()
- sched/uclamp: Make cpu_overutilized() use util_fits_cpu()
- sched/uclamp: Cater for uclamp in find_energy_efficient_cpu()'s early exit
condition
- sched/fair: Detect capacity inversion
- sched/fair: Consider capacity inversion in util_fits_cpu()
- sched/uclamp: Fix a uninitialized variable warnings
- sched/fair: Fixes for capacity inversion detection
- virtiofs: clean up error handling in virtio_fs_get_tree()
- virtiofs: split requests that exceed virtqueue size
- fuse: check s_root when destroying sb
- fuse: fix attr version comparison in fuse_read_update_size()
- fuse: always revalidate rename target dentry
- fuse: fix deadlock between atomic O_TRUNC and page invalidation
- Revert "ext4: fix use-after-free in ext4_xattr_set_entry"
- ext4: remove duplicate definition of ext4_xattr_ibody_inline_set()
- ext4: fix use-after-free in ext4_xattr_set_entry
- udp: Call inet6_destroy_sock() in setsockopt(IPV6_ADDRFORM).
- tcp/udp: Call inet6_destroy_sock() in IPv6 sk->sk_destruct().
- inet6: Remove inet6_destroy_sock() in sk->sk_prot->destroy().
- dccp: Call inet6_destroy_sock() via sk->sk_destruct().
- sctp: Call inet6_destroy_sock() via sk->sk_destruct().
- [arm64,armhf] pwm: meson: Explicitly set .polarity in .get_state()
- ASN.1: Fix check for strdup() success
.
[ Salvatore Bonaccorso ]
* netfilter: nf_tables: deactivate anonymous set from preparation phase
(CVE-2023-32233)
* [rt] Refresh "sched/hotplug: Ensure only per-cpu kthreads run during
hotplug"
* Bump ABI to 23
* ovl: fail on invalid uid/gid mapping at copy up (CVE-2023-0386)
* [x86] KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_mask() with
vcpu_mask==NULL (Closes: #1035779)
Checksums-Sha1:
887c1be93ef27038f47672e9d9a0844a9dd65a87 8609 linux-signed-amd64_5.10.179+1.dsc
cda3fab91b828fe2c49a5335be4335400743822d 2847880 linux-signed-amd64_5.10.179+1.tar.xz
Checksums-Sha256:
89a5114d774144d0c88fa993fc16e08a6702e14081bb82c6263bf9f5d5bb468f 8609 linux-signed-amd64_5.10.179+1.dsc
e03a6cd3e527ffb6ca106aefd19a9638cec278c23eecb592b78737e43d27fe96 2847880 linux-signed-amd64_5.10.179+1.tar.xz
Files:
04b6b486cd56651a94c8c97e63a14d82 8609 kernel optional linux-signed-amd64_5.10.179+1.dsc
d331d0ff9b65f19c5090c17c457bbaf2 2847880 kernel optional linux-signed-amd64_5.10.179+1.tar.xz
-----BEGIN PGP SIGNATURE-----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=I8z/
-----END PGP SIGNATURE-----