• Accepted linux 5.10.46-5 (source) into proposed-updates->stable-new, pr

    From Debian FTP Masters@21:1/5 to All on Sun Sep 26 00:10:02 2021
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    Format: 1.8
    Date: Thu, 23 Sep 2021 22:35:21 +0200
    Source: linux
    Architecture: source
    Version: 5.10.46-5
    Distribution: bullseye-security
    Urgency: high
    Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
    Changed-By: Salvatore Bonaccorso <carnil@debian.org>
    Closes: 993948 993978
    Changes:
    linux (5.10.46-5) bullseye-security; urgency=high
    .
    * virtio_console: Assure used length from device is limited (CVE-2021-38160)
    * NFSv4: Initialise connection to the server in nfs4_alloc_client()
    (CVE-2021-38199)
    * tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
    (CVE-2021-3679)
    * [poewrpc*] KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
    (CVE-2021-37576)
    * ovl: prevent private clone if bind mount is not allowed (CVE-2021-3732)
    * [x86] KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
    (CVE-2021-3653)
    * [x86] KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
    * bpf: Fix integer overflow involving bucket_size (CVE-2021-38166)
    * ath: Use safer key clearing with key cache entries (CVE-2020-3702)
    * ath9k: Clear key cache explicitly on disabling hardware (CVE-2020-3702)
    * ath: Export ath_hw_keysetmac() (CVE-2020-3702)
    * ath: Modify ath_key_delete() to not need full key entry (CVE-2020-3702)
    * ath9k: Postpone key cache entry deletion for TXQ frames reference it
    (CVE-2020-3702)
    * btrfs: fix NULL pointer dereference when deleting device by invalid id
    (CVE-2021-3739)
    * net: qrtr: fix another OOB Read in qrtr_endpoint_post (CVE-2021-3743)
    * vt_kdsetmode: extend console locking (CVE-2021-3753)
    * ext4: fix race writing to an inline_data file while its xattrs are changing
    (CVE-2021-40490)
    * dccp: don't duplicate ccid when cloning dccp sock (CVE-2020-16119)
    * io_uring: ensure symmetry in handling iter types in loop_rw_iter()
    (CVE-2021-41073)
    * netfilter: nftables: avoid potential overflows on 32bit arches
    * netfilter: nf_tables: initialize set before expression setup
    (Closes: #993978)
    * netfilter: nftables: clone set element expression template
    * bnx2x: Fix enabling network interfaces without VFs (Closes: #993948) Checksums-Sha1:
    d1458c7326ce4332617212e98a983ac139344ba1 195000 linux_5.10.46-5.dsc
    28d0ba1a26c98af40cd304a2dbbb9e7c03f2d172 121572512 linux_5.10.46.orig.tar.xz
    4085ce547e614c23d59041a078bc5652c0df1db5 4390148 linux_5.10.46-5.debian.tar.xz
    ff3a78a06e7ae519192ad245030dfa58acaa0b95 6274 linux_5.10.46-5_source.buildinfo Checksums-Sha256:
    faddec22b3f6d13ec8b86f54449307c424252abe4b155672b28501dafb26474f 195000 linux_5.10.46-5.dsc
    bcd8edcbc6ed21d93dc138a754b1ac08329452c2ea509ae2a4071cd521da38a3 121572512 linux_5.10.46.orig.tar.xz
    89b2f8dae10a1b167b2579eab73ddef07b713bb3dd96ed566538031466bf5c81 4390148 linux_5.10.46-5.debian.tar.xz
    1837fad0a852eb9c0dd57fc023bb056b05bc131e6a02f85bf961b906b1cdf1c4 6274 linux_5.10.46-5_source.buildinfo
    Files:
    7c32c30fb6f87698983b725febb45572 195000 kernel optional linux_5.10.46-5.dsc
    20074caf4bbf7773920f6e5f08beb771 121572512 kernel optional linux_5.10.46.orig.tar.xz
    7fbaae18cabdac77a69b9de7299807b8 4390148 kernel optional linux_5.10.46-5.debian.tar.xz
    eda90cb533c6861c00b15a0d70a656dc 6274 kernel optional linux_5.10.46-5_source.buildinfo

    -----BEGIN PGP SIGNATURE-----

    iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmFM5b9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EnawP/jnqcsJc2V5T7hnTwPKVd0buBGuBZhKG WRTPy3/vzZPtC8Lakoc8Jr6QCoJfsRgPbrLP8cALujnZJMGGoJBzRYABAoitoDY5 1NxEzPuGe7dOo0SJ73x/9uWjmERelyoglTY5+pr6+R4bh9rg/d3nIzheajL9PgCR OGDpvuR/I0RB3r0xn9UaiFiMoqNiL5SDtbB6TZNRkMMFvQDBoMcVPERUbhT2FMsO 6U1LOdGaTASkI8M2ZDQgySUlO20FGNE+D98p2KTXlxjSKFMdw/fIFdCYwX2eLoQ/ Ys9rVD6FIsrfAI/7uZ7yrO4URPCjmH9Po2yRVBrk13+dNmBG3Y22G1rcopPiLug2 YW/HhWeQ0QYtFknG1txeQuT+81Zxezu/9QjBZPdhi74Sjw7FzxfJwJKjdw5x8TMe /W3hqJ9cPD1KiiI1xPVEf5WP7uY/M9hE53qv2MPc4XVT3Y5mWJBpZqBnVS6pGJc7 nHf25fXhpN0lLSPw6NGbcBr2JFswrKXIGOAGB05O06SgS2g8ChCiJOM6Qfb0TMno w/tKkGI3ZegUYM0qveGpmimbBmUDGksH7MIBV3w3TyyECo2UI+Cfn6je3etXk4gS 0ei78jAlxdURdk57tKw4eEiQ+U/6TOgD6g6QIr6hfh6g4nPOmmxQND1yY+XfTaNZ
    XMKyDaVx/0cs
    =F4Sw
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)