Accepted linux-signed-amd64 6.4.4+2 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted linux-signed-amd64 6.4.4+2 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 01 Aug 2023 11:35:07 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-amd64_6.4.4+2_source.changes
- Debian-source: linux-signed-amd64
- Debian-suite: unstable
- Debian-version: 6.4.4+2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=5L7fyS4FmxhgHWnExYUo0equK4xf6+wxCrr1WTqwoa8=; b=LQVx2tMUfTNviIpPdO0MtmXv39 DTbqhRZaH3EdC2qcy4sZuw4RV+mj7M1o0x9KXK84PWd2l3Ae8drboBzgU1Q3j5I8PsZa25Tz0NIAs vxmYjpFFXV0yzHLiSHcJoTU0E4P95pfWTWipU5+Q3cktldpsMyKSU/oW5gwpUpG0dDUAqs2h8z3c2 c+AS8GKV1qosfdJI10EfIsidJMGitKhxC8E+uUDZNcm8m0lqwAMg+ku38+bT387+uhXFGhDcPROZu j2voWwo4xR8sl5G+pT3WgtGZqlKDlUZ1Jpzt3tHVTQ6RJwPyYsQMiiIAdhKoHp07bfbBFy+nZ4I4C CrDaxY3Q==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qQned-000QGd-Ag@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 30 Jul 2023 06:50:27 +0200
Source: linux-signed-amd64
Architecture: source
Version: 6.4.4+2
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-amd64 (6.4.4+2) unstable; urgency=high
.
* Sign kernel from linux 6.4.4-2
.
[ John Paul Adrian Glaubitz ]
* [sh4] Add i2c-modules udeb for sh7785lcr flavor
.
[ Salvatore Bonaccorso ]
* [x86] cpu/amd: Move the errata checking functionality up
* [x86] cpu/amd: Add a Zenbleed fix (CVE-2023-20593)
* net/sched: cls_fw: Fix improper refcount update leads to use-after-free
(CVE-2023-3776)
* net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611)
Checksums-Sha1:
3bf06eb5f72aaa9d944a5e6455e9ad8338d0bba3 8359 linux-signed-amd64_6.4.4+2.dsc
8576edc47bb6067be02bdb6f15d1e197b31e886f 3028508 linux-signed-amd64_6.4.4+2.tar.xz
Checksums-Sha256:
4a4b30a2e40e6135d7da9300737a79c56c917142328daedef5c11c4152de42f6 8359 linux-signed-amd64_6.4.4+2.dsc
2999e931dc63d104f8f2f68e5b64a16638160d70662c9499588d4ddbba603865 3028508 linux-signed-amd64_6.4.4+2.tar.xz
Files:
407edc1043c48208a78af41444861ccb 8359 kernel optional linux-signed-amd64_6.4.4+2.dsc
683ee930010f283952492bf074cf5d91 3028508 kernel optional linux-signed-amd64_6.4.4+2.tar.xz
-----BEGIN PGP SIGNATURE-----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=yQFX
-----END PGP SIGNATURE-----