Accepted linux-signed-arm64 5.10.179+1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted linux-signed-arm64 5.10.179+1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 14 May 2023 17:20:36 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-arm64_5.10.179+1_source.changes
- Debian-source: linux-signed-arm64
- Debian-suite: proposed-updates
- Debian-version: 5.10.179+1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=YJer25MDULzcsh4GRo7O9oBvbhz+7bj2wB5Q7qim8Mw=; b=s2CxjJMwikEgTiTRtnk/41G2Fo G3lNx0gwVl68LXtVE/83DcgrqqiUrN0IXSKMplT3nEjBQIhx2hVQXHOc4QcGefrSWGBih/l5Y7zuL smg966RP2qmYOxDiP96ks1HxjGyYsnuxfxXVsD96EhjTjhTqG0/3he15oTKHnHJP+YOxv5lDaH9pV 26RkueHsvf2JrfBPPKD4XI1kVXhcguSyxR6lRPW1zjkaWpXFOF3BIYIMn6isH6olApek/h1UesJUx v1nbrZHAL0h9ggKJSbxgTUjYx7M3ca46k6DiKZ9JXgUizGgRvF0UnBrbN2E0notoyYC0t3rMy7lof r3kw8x4A==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pyFOe-004I8S-Pv@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 12 May 2023 06:08:40 +0200
Source: linux-signed-arm64
Architecture: source
Version: 5.10.179+1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-arm64 (5.10.179+1) bullseye-security; urgency=high
.
* Sign kernel from linux 5.10.179-1
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.179
- [arm64] dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node
- netfilter: br_netfilter: fix recent physdev match breakage
- [arm64,armhf] regulator: fan53555: Explicitly include bits header
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
(CVE-2023-31436)
- virtio_net: bugfix overflow inside xdp_linearize_page()
- sfc: Split STATE_READY in to STATE_NET_DOWN and STATE_NET_UP.
- sfc: Fix use-after-free due to selftest_work
- netfilter: nf_tables: fix ifdef to also consider nf_tables=m
- i40e: fix accessing vsi->active_filters without holding lock
- i40e: fix i40e_setup_misc_vector() error handling
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next()
- net: rpl: fix rpl header size calculation
- bpf: Fix incorrect verifier pruning due to missing register precision
taints
- e1000e: Disable TSO on i219-LM card to increase speed
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event
- Input: i8042 - add quirk for Fujitsu Lifebook A574/H
- scsi: megaraid_sas: Fix fw_crash_buffer_show()
- scsi: core: Improve scsi_vpd_inquiry() checks
- [s390x] ptrace: fix PTRACE_GET_LAST_BREAK error handling
- nvme-tcp: fix a possible UAF when failing to allocate an io queue
- xen/netback: use same error messages for same errors
- xfs: drop submit side trans alloc for append ioends
- iio: light: tsl2772: fix reading proximity-diodes from device tree
- nilfs2: initialize unused bytes in segment summary blocks
- memstick: fix memory leak if card device is never registered
- kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
- mm/khugepaged: check again on anon uffd-wp during isolation
- sched/uclamp: Make task_fits_capacity() use util_fits_cpu()
- sched/uclamp: Fix fits_capacity() check in feec()
- sched/uclamp: Make select_idle_capacity() use util_fits_cpu()
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu()
- sched/uclamp: Make cpu_overutilized() use util_fits_cpu()
- sched/uclamp: Cater for uclamp in find_energy_efficient_cpu()'s early exit
condition
- sched/fair: Detect capacity inversion
- sched/fair: Consider capacity inversion in util_fits_cpu()
- sched/uclamp: Fix a uninitialized variable warnings
- sched/fair: Fixes for capacity inversion detection
- virtiofs: clean up error handling in virtio_fs_get_tree()
- virtiofs: split requests that exceed virtqueue size
- fuse: check s_root when destroying sb
- fuse: fix attr version comparison in fuse_read_update_size()
- fuse: always revalidate rename target dentry
- fuse: fix deadlock between atomic O_TRUNC and page invalidation
- Revert "ext4: fix use-after-free in ext4_xattr_set_entry"
- ext4: remove duplicate definition of ext4_xattr_ibody_inline_set()
- ext4: fix use-after-free in ext4_xattr_set_entry
- udp: Call inet6_destroy_sock() in setsockopt(IPV6_ADDRFORM).
- tcp/udp: Call inet6_destroy_sock() in IPv6 sk->sk_destruct().
- inet6: Remove inet6_destroy_sock() in sk->sk_prot->destroy().
- dccp: Call inet6_destroy_sock() via sk->sk_destruct().
- sctp: Call inet6_destroy_sock() via sk->sk_destruct().
- [arm64,armhf] pwm: meson: Explicitly set .polarity in .get_state()
- ASN.1: Fix check for strdup() success
.
[ Salvatore Bonaccorso ]
* netfilter: nf_tables: deactivate anonymous set from preparation phase
(CVE-2023-32233)
* [rt] Refresh "sched/hotplug: Ensure only per-cpu kthreads run during
hotplug"
* Bump ABI to 23
* ovl: fail on invalid uid/gid mapping at copy up (CVE-2023-0386)
* [x86] KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_mask() with
vcpu_mask==NULL (Closes: #1035779)
Checksums-Sha1:
dea300f63a079a267886d75c26b42991cf4bca25 7340 linux-signed-arm64_5.10.179+1.dsc
3f38155a49ed44636b3ec1fe1d92f78247015f0b 2591080 linux-signed-arm64_5.10.179+1.tar.xz
Checksums-Sha256:
215f08873792b492c8244c3fe2d50bc790b239f62ad06dbcd21f8bad3c71ee3b 7340 linux-signed-arm64_5.10.179+1.dsc
5ad3e3d8701cf333291968151856223fe601947a4b0e1299cf22da381e756ddc 2591080 linux-signed-arm64_5.10.179+1.tar.xz
Files:
e4d16320d8e964f28fbefdd6bfc62b28 7340 kernel optional linux-signed-arm64_5.10.179+1.dsc
2a8798674da9ab11cdf5eae3d5cfa51f 2591080 kernel optional linux-signed-arm64_5.10.179+1.tar.xz
-----BEGIN PGP SIGNATURE-----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=YQqq
-----END PGP SIGNATURE-----