Accepted linux-signed-i386 6.4.4+2 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted linux-signed-i386 6.4.4+2 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 01 Aug 2023 17:59:07 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: linux-signed-i386_6.4.4+2_source.changes
- Debian-source: linux-signed-i386
- Debian-suite: unstable
- Debian-version: 6.4.4+2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=VntyS8B8Xxn0OZnCuXjtFkfHxDALGRtBHYxYYWI5kDs=; b=L6SpqrjvMTdCQO5drKm6vQfNAq Abg2dfjlkzj5zcLgKpYGgSN47dpnUovzNbRwR89flSTttwE+rhbGtFsIL2IDwNftxLrDYTRAnsEU2 h61B3Q7Qe3wHcqYISnVh0nmN4b0ooYwm0fhGBbY7lqR814DDNghmhmbLtmaeQH1qS5l0E/xFSnnfC Iwx8ljAg+0g5BbyCgQvNYdS8cD4lHU7AeustuKjmZ2eRXKClSNaGy4BLiYCaA2vRM7yoyKWtGiNdt yKF/Rhr09lgrp+qERYOIGYe/eUY8vuyBUQhlbvH5T9BEiIyVVlBKLgARzTFOWvwjv6v+NY5/4Bvze gT4P5o2Q==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qQteF-0033FE-2k@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 30 Jul 2023 06:50:27 +0200
Source: linux-signed-i386
Architecture: source
Version: 6.4.4+2
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
linux-signed-i386 (6.4.4+2) unstable; urgency=high
.
* Sign kernel from linux 6.4.4-2
.
[ John Paul Adrian Glaubitz ]
* [sh4] Add i2c-modules udeb for sh7785lcr flavor
.
[ Salvatore Bonaccorso ]
* [x86] cpu/amd: Move the errata checking functionality up
* [x86] cpu/amd: Add a Zenbleed fix (CVE-2023-20593)
* net/sched: cls_fw: Fix improper refcount update leads to use-after-free
(CVE-2023-3776)
* net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611)
Checksums-Sha1:
fdb82b63600e7420465238034f718101ab392bf4 13808 linux-signed-i386_6.4.4+2.dsc
f77016a00f642515a2221a091eb6490889d3f6c9 3938204 linux-signed-i386_6.4.4+2.tar.xz
Checksums-Sha256:
bbb97499c2dc7b5df066f0c9d9c761ebd09431ec3b7631ae160469e05e7a7ebb 13808 linux-signed-i386_6.4.4+2.dsc
b2484228b4ded392e9e80ba3cfa393d18b6aa30aedd6c0252c37e6b738517902 3938204 linux-signed-i386_6.4.4+2.tar.xz
Files:
219922b3977d35bf3c8620d31c8c1250 13808 kernel optional linux-signed-i386_6.4.4+2.dsc
8cde2809108f07f626acd5f4a43c36c7 3938204 kernel optional linux-signed-i386_6.4.4+2.tar.xz
-----BEGIN PGP SIGNATURE-----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=2Y1i
-----END PGP SIGNATURE-----