-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 09 Jan 2021 21:25:11 +0100 Source: linux Architecture: source Version: 5.10.5-1 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 970736 972968 973870 979496 Changes: linux (5.10.5-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.5 - net/sched: sch_taprio: reset child qdiscs before freeing them - ethtool: fix error paths in ethnl_set_channels() - ethtool: fix string set id check - md/raid10: initialize r10_bio->read_slot before use. - io_uring: close a small race gap for files cancel - jffs2: Allow setting rp_size to zero during remounting - jffs2: Fix NULL pointer dereference in rp_size fs option parsing - opp: fix memory leak in _allocate_opp_table - opp: Call the missing clk_put() on error - scsi: block: Fix a race in the runtime power management code - mm/hugetlb: fix deadlock in hugetlb_cow error path - mm: memmap defer init doesn't work as expected - [s390x] lib/zlib: fix inflating zlib streams on s390 - io_uring: don't assume mm is constant across submits - io_uring: use bottom half safe lock for fixed file data - io_uring: add a helper for setting a ref node - io_uring: fix io_sqe_files_unregister() hangs - uapi: move constants from <linux/kernel.h> to <linux/const.h> - tools headers UAPI: Sync linux/const.h with the kernel headers - cgroup: Fix memory leak when parsing multiple source parameters - [s390x] zlib: move EXPORT_SYMBOL() and MODULE_LICENSE() out of dfltcc_syms.c - Bluetooth: hci_h5: close serdev device and free hu in h5_close - fbcon: Disable accelerated scrolling - reiserfs: add check for an invalid ih_entry_count - [x86] misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() - media: gp8psk: initialize stats at power control logic - f2fs: fix shift-out-of-bounds in sanity_check_raw_super() - ALSA: seq: Use bool for snd_seq_queue internal flags - ALSA: rawmidi: Access runtime->avail always in spinlock - bfs: don't use WARNING: string when it's just info. - ext4: check for invalid block size early when mounting a file system - fcntl: Fix potential deadlock in send_sig{io, urg}() - io_uring: check kthread stopped flag when sq thread is unparked - [arm64,armhf] rtc: sun6i: Fix memleak in sun6i_rtc_clk_init - module: set MODULE_STATE_GOING state when a module fails to load - quota: Don't overflow quota file offsets - [arm64,armhf] rtc: pl031: fix resource leak in pl031_probe - i3c master: fix missing destroy_workqueue() on error in i3c_master_register - NFSv4: Fix a pNFS layout related use-after-free race when freeing the inode - f2fs: avoid race condition for shrinker count - f2fs: fix race of pending_pages in decompression - module: delay kobject uevent until after module init call - [powerpc*] 64: irq replay remove decrementer overflow check - fs/namespace.c: WARN if mnt_count has become negative - ceph: fix inode refcount leak when ceph_fill_inode on non-I_NEW inode fails - tick/sched: Remove bogus boot "safety" check - [s390x] always clear kernel stack backchain before calling functions - io_uring: remove racy overflow list fast checks - ALSA: pcm: Clear the full allocated memory at hw_params - dm verity: skip verity work if I/O error when system is shutting down - ext4: avoid s_mb_prefetch to be zero in individual scenarios - device-dax: Fix range release . [ Luca Boccassi ] * [amd64,arm64] Generate BTF debug info: (partially closes: #973870) - Enable DEBUG_INFO_BTF. - Build-Depend on dwarves >= 1.16~. . [ Aurelien Jarno ] * usbip: depend on usb.ids instead of usbutils. * [mips*] Fix build with binutils configured with --enable-mips-fix-loongson3-llsc=yes. . [ Salvatore Bonaccorso ] * Bluetooth: Fix attempting to set RPA timeout when unsupported (Closes: #972968) * net: cdc_ncm: correct overhead in delayed_ndp_size (Closes: #970736) * mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start (CVE-2020-36158) * [rt] Update to 5.10.4-rt22 * X.509: Fix crash caused by NULL pointer (Closes: #979496) * Revert "drm/amd/display: Fix memory leaks in S3 resume" Checksums-Sha1: 1240d4ef9da06d2aa68067f9716d2bc4e25a07f2 194993 linux_5.10.5-1.dsc 4375e0984b947c42fc63532ee7abcd241597f6ee 121440392 linux_5.10.5.orig.tar.xz 8df056d92eff452d1f521af004438baf510eb837 3913176 linux_5.10.5-1.debian.tar.xz 3e182e9aee998673e3c3213e1a917c0e731df6c3 6262 linux_5.10.5-1_source.buildinfo Checksums-Sha256: 3fdf89a0935ebadf4f5ac50e3fcf1fc756a937f803c16074246b727eb3020dd8 194993 linux_5.10.5-1.dsc de9c540dd73e214f84bf28380d37064a873b9cb31a4f268e5b9dd2eecf03cbf4 121440392 linux_5.10.5.orig.tar.xz d71dbdb88e8bbfcf97953d1c1f476e74cd9411814679b9e364b8d956f682764f 3913176 linux_5.10.5-1.debian.tar.xz 24629a112caee4ab74a156112260d7b741ab0d5a2a6e1996006c841fb5f2024f 6262 linux_5.10.5-1_source.buildinfo Files: dbe8834015dfda72e66357ed37374101 194993 kernel optional linux_5.10.5-1.dsc 4d9f70e45cf6d7d322abe464b12be361 121440392 kernel optional linux_5.10.5.orig.tar.xz dbfd5b878d246c94673e92b6746377ec 3913176 kernel optional linux_5.10.5-1.debian.tar.xz 9142ca9631cf05d23b216e4cfed4440d 6262 kernel optional linux_5.10.5-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl/6EahfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89E97cQAKLFcMR0sgSBPz819WFTN152VCkApJv3 C40UvKlail7coXlJHYjf8RjZyrBYZOaSwaBbgvNPcIotbmmAuGxPoWULYhlv/Iks +Is1o272BSy5OMjw5cWaetdfDBFjDKR+IMfV8qP1seMX78iqG3/cljmuMeznmvyu 3sB0nzug12D79/G33fh9rgX808TSh/E78T0xrYIBWgFGI9exYyDKLEM7AUxUR3iz yJZFf+j5CeOSJ0ef9uXkgLiHnhs4qgWPOk71k8M2JTm7/juYt+gp9hysOnIh0xa2 p+md8GTburSyHIjUeR7pDDP+eaPsVxJJtcBiGYIbupKlOG3wni83Fpm71HolrJt1 yDPDIYZRipnD3009eyZGBThRvpDVH1KtZCVgKlYEfbgf8zTuZ3s1zXeSwP/VPv0+ 30LeQu09Ia4T/o8dLtwLWDTfN4JsoqmHTsTHP9KLoj7zKHnTbM9/26Y3m0HGQOhS 1RSNfPdH/gFvasjlg60WKhAXwuwa1c70tItxbEmreJwOTXIuKqUO4unS0dpl9e+l 5SomIVUotsIOMriz88K0XjYvCQKbptObvnDeob7v1x4Ii5iR3uJ8cdzlJRCYslFp kRiufzI0SFHyE1GzZjUa5ZbV5lDivERqH2TiCMrZIpa/mdcbbh6j5fmSjENW7aaq 9Dac9C6jZ5pn =pVfc -----END PGP SIGNATURE-----