Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
For Debian 10 buster, the corresponding linux-signed packages have also been updated using the Freexian CA certificate. Note that in order to boot the updated kernels using Secure Boot, the updated shim-signed packages (which ship the Freexian CA) need to be installed. For more information see the shim announcement.
For Debian 10 buster, these problems have been fixed in version 5.10.226-1~deb10u1.
For Debian 8 jessie, these problems have been fixed in version 5.10.226-1~deb8u1.
For Debian 9 stretch, these problems have been fixed in version 5.10.226-1~deb9u1.
We recommend that you upgrade your linux-5.10 packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.