Debian buster Openstack images changelog 10.10.4-20211002 Updates in 1 source package(s), 2 binary package(s): Source tzdata, binaries: tzdata:amd64 tzdata:arm64 tzdata (2021a-0+deb10u2) buster; urgency=medium * Cherry-pick patches from tzdata-2021b until the upstream situation gets less confused: - 01-no-leap-second-2021-12-31.patch: No leap second on 2021-12-31 as per IERS Bulletin C 62. - 02-samoa-dst.patch: Samoa no longer observes DST. - 03-jordan-dst.patch: Jordan now starts DST on February's last Thursday. -- Steve McIntyre <93sam@debian.org> Sat, 02 Oct 2021 21:21:50 +0000 10.10.3-20210826 Updates in 2 source package(s), 12 binary package(s): Source krb5, binaries: libgssapi-krb5-2:amd64 libk5crypto3:amd64 libkrb5-3:amd64 libkrb5support0:amd64 libgssapi-krb5-2:arm64 libk5crypto3:arm64 libkrb5-3:arm64 libkrb5support0:arm64 krb5 (1.17-3+deb10u2) buster-security; urgency=high * Import upstream patch for CVE-2021-36222, Closes: #991365 Source openssl, binaries: libssl1.1:amd64 openssl:amd64 libssl1.1:arm64 openssl:arm64 openssl (1.1.1d-0+deb10u7) buster-security; urgency=medium * CVE-2021-3711 (SM2 Decryption Buffer Overflow). * CVE-2021-3712 (Read buffer overruns processing ASN.1 strings). -- Steve McIntyre <93sam@debian.org> Thu, 26 Aug 2021 16:28:46 +0000 10.10.2-20210723 Updates in 3 source package(s), 14 binary package(s): Source linux-signed-amd64, binaries: linux-image-4.19.0-17-cloud-amd64:amd64 linux-signed-amd64 (4.19.194+3) buster-security; urgency=high * Sign kernel from linux 4.19.194-3 * [x86] KVM: SVM: Periodically schedule when unregistering regions on destroy (CVE-2020-36311) * can: bcm: fix infoleak in struct bcm_msg_head (CVE-2021-34693) * can: bcm: delay release of struct bcm_op after synchronize_rcu() (CVE-2021-3609) * seq_file: Disallow extremely large seq buffer allocations (CVE-2021-33909) Source linux-signed-arm64, binaries: linux-image-4.19.0-17-arm64:arm64 linux-signed-arm64 (4.19.194+3) buster-security; urgency=high * Sign kernel from linux 4.19.194-3 * [x86] KVM: SVM: Periodically schedule when unregistering regions on destroy (CVE-2020-36311) * can: bcm: fix infoleak in struct bcm_msg_head (CVE-2021-34693) * can: bcm: delay release of struct bcm_op after synchronize_rcu() (CVE-2021-3609) * seq_file: Disallow extremely large seq buffer allocations (CVE-2021-33909) Source systemd, binaries: libpam-systemd:amd64 libsystemd0:amd64 libudev1:amd64 systemd:amd64 systemd-sysv:amd64 udev:amd64 libpam-systemd:arm64 libsystemd0:arm64 libudev1:arm64 systemd:arm64 systemd-sysv:arm64 udev:arm64 systemd (241-7~deb10u8) buster-security; urgency=high * Non-maintainer upload by the Security Team. * basic/unit-name: do not use strdupa() on a path (CVE-2021-33910) -- Steve McIntyre <93sam@debian.org> Fri, 23 Jul 2021 12:14:54 +0000 10.10.1-20210624 Updates in 2 source package(s), 2 binary package(s): Source linux-signed-amd64, binaries: linux-image-4.19.0-17-cloud-amd64:amd64 linux-signed-amd64 (4.19.194+2) buster; urgency=medium * Sign kernel from linux 4.19.194-2 * proc: Track /proc/$pid/attr/ opener mm_struct (Closes: #990072) Source linux-signed-arm64, binaries: linux-image-4.19.0-17-arm64:arm64 linux-signed-arm64 (4.19.194+2) buster; urgency=medium * Sign kernel from linux 4.19.194-2 * proc: Track /proc/$pid/attr/ opener mm_struct (Closes: #990072) -- Steve McIntyre <93sam@debian.org> Thu, 24 Jun 2021 13:41:37 +0000 10.10.0 First build for 10.10.0 release -- Andy Simpkins Sat, 19 Jun 2021 13:16:29 +0000