Accepted linux-signed-i386 6.1.2+1~exp1 (source) into experimental
- To: debian-devel-changes@lists.debian.org, debian-experimental-changes@lists.debian.org
- Subject: Accepted linux-signed-i386 6.1.2+1~exp1 (source) into experimental
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 02 Jan 2023 03:34:18 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-i386_6.1.2+1~exp1_source.changes
- Debian-source: linux-signed-i386
- Debian-suite: experimental
- Debian-version: 6.1.2+1~exp1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=6+emCAvbhi8SkmmuhJpoVCb9bf7cozwPjIc6+TwWZ7g=; b=fYcWqRWPS9Yi7qrcxKFwUpST7Y 5okUg2ayCq7qRkhEf7TnyOnfx6tbXpsBpPV2gxPBNd662n4M9m0tsC4gEcActO1ki/h+TZ1ul5YBz Dz6r0R9CbQJjyUIs/7llhWD/Mxu8GrKAgnFniQWAbFeLdQ+u6mwrcN6Yjs4OqyifrW3j4+Ueshmpx 8eZknBzt4Q9KXCiFYpYbQ2njYyu7E+JvVmKzSU74EH2X1M+5RXA5Dj1ILB8F90wwXZc0pXt5AW7Tc qI2dRG9dqodQaVFJF4YbHsO4yeBE3BQybfBIjrU3jAkj351Si4CeXF08/BVI3FGU76uy6UjFU6aNq hL8CWixg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pCBac-007wVV-8y@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 01 Jan 2023 10:57:02 +0100
Source: linux-signed-i386
Architecture: source
Version: 6.1.2+1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-i386 (6.1.2+1~exp1) experimental; urgency=medium
.
* Sign kernel from linux 6.1.2-1~exp1
.
* New upstream stable update:
https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2
- misc: sgi-gru: fix use-after-free error in gru_set_context_option,
gru_fault and gru_handle_user_call_os (CVE-2022-3424)
- i2c: ismt: Fix an out-of-bounds bug in ismt_access() (CVE-2022-2873)
.
[ Ben Hutchings ]
* Fix build regression in stage1 and pkg.linux.nokernel profiles
* linux-perf: Simplify build-dependency on libbabeltrace-dev
* linux-perf: Build with libzstd
* linux-perf: Disable building with libdebuginfod
* linux-perf: Update variable definitions to disable building with libbfd
.
[ Salvatore Bonaccorso ]
* [rt] Refresh "net: Remove the obsolte u64_stats_fetch_*_irq() users (net)."
Checksums-Sha1:
b2864563cd8ef7568f0aa259a06bd09c94018c08 13848 linux-signed-i386_6.1.2+1~exp1.dsc
ee0a5a062a52aee0c1caa316d56d765235127ff3 3852136 linux-signed-i386_6.1.2+1~exp1.tar.xz
Checksums-Sha256:
dcc74901666ea009e0cfc0487b37127ab101701166e630b26d3206cef2926c89 13848 linux-signed-i386_6.1.2+1~exp1.dsc
24f75f07c90ae644b52f5ac3da0fc207f58097a1b222651a5883b70ce4200948 3852136 linux-signed-i386_6.1.2+1~exp1.tar.xz
Files:
878583b74cc818381b9ff833c5d968ab 13848 kernel optional linux-signed-i386_6.1.2+1~exp1.dsc
361a298b97d826de6422a58eb0ad0979 3852136 kernel optional linux-signed-i386_6.1.2+1~exp1.tar.xz
-----BEGIN PGP SIGNATURE-----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=RpEl
-----END PGP SIGNATURE-----