Accepted linux-signed-arm64 6.4.4+2 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted linux-signed-arm64 6.4.4+2 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 01 Aug 2023 14:40:04 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-arm64_6.4.4+2_source.changes
- Debian-source: linux-signed-arm64
- Debian-suite: unstable
- Debian-version: 6.4.4+2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=fproqrU8kNqv3MHDGSfvkn/C8dEdBT2e8b7sbInKbiY=; b=tv+RbtYH+DZuOs52qnOC/KOtsm ayAoQqI3yhmO2H10LYSYvXkTvTpALhaiT5c2ZxN5RoXme1/s+FAxnEECoMUCDuiv6/WJnE8DiadYY 6c9YOyinNl0Vyw3EpbElnwSfPSgf6yU/oYOAQYFi+yDA6807nq0/Y/wH69WwV20rMFa0OcNvK2YJt LqN0b/G8a4RaarnEo41Jvjtfy4bXG9n/v3j546DccNynV/5UzX/2NOOArWNcLqyslkQJLy4+oQHBh FxDRfTqk7g+K5Dmy+8EY5Ux/0QzinzIr8WR5FXfrRoBp/bAgG304SOXPE6i+CIFQJE5lvfBLhoZ3I 4ePyQ3hg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qQqXc-001uPE-Vr@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 30 Jul 2023 06:50:27 +0200
Source: linux-signed-arm64
Architecture: source
Version: 6.4.4+2
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-arm64 (6.4.4+2) unstable; urgency=high
.
* Sign kernel from linux 6.4.4-2
.
[ John Paul Adrian Glaubitz ]
* [sh4] Add i2c-modules udeb for sh7785lcr flavor
.
[ Salvatore Bonaccorso ]
* [x86] cpu/amd: Move the errata checking functionality up
* [x86] cpu/amd: Add a Zenbleed fix (CVE-2023-20593)
* net/sched: cls_fw: Fix improper refcount update leads to use-after-free
(CVE-2023-3776)
* net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611)
Checksums-Sha1:
46c7877c9342d08b531a61c19975a3b601425491 7351 linux-signed-arm64_6.4.4+2.dsc
474b94283ca93157cfe94b3292044ff678511253 2835608 linux-signed-arm64_6.4.4+2.tar.xz
Checksums-Sha256:
7b6320bb79668f330a9b56075b6c70efa95ffbdc219374b2e029e97d0ad010dc 7351 linux-signed-arm64_6.4.4+2.dsc
b9951ca95f4233f14e4745b7041c9621f3833f50ef0f70d4b0f4d99cb9d17978 2835608 linux-signed-arm64_6.4.4+2.tar.xz
Files:
4edc61fb2b627c63cafc5e51ccfb15d5 7351 kernel optional linux-signed-arm64_6.4.4+2.dsc
6ca6ed951a3bbada92a9bbf075221698 2835608 kernel optional linux-signed-arm64_6.4.4+2.tar.xz
-----BEGIN PGP SIGNATURE-----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=HhMt
-----END PGP SIGNATURE-----