[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux-signed-arm64 5.16~rc6+1~exp1 (source) into experimental, experimental



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 20 Dec 2021 22:47:25 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.16~rc6+1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux-signed-arm64 (5.16~rc6+1~exp1) experimental; urgency=medium
 .
   * Sign kernel from linux 5.16~rc6-1~exp1
 .
   * New upstream release candidate
 .
   [ Aurelien Jarno ]
   * [riscv64] Improve HiFive Unmatched support: enable INPUT_DA9063_ONKEY,
     MFD_DA9063, REGULATOR_DA9063, RTC_DRV_DA9063, DA9063_WATCHDOG.
 .
   [ Salvatore Bonaccorso ]
   * xen/blkfront: harden blkfront against event channel storms (CVE-2021-28711)
   * xen/netfront: harden netfront against event channel storms (CVE-2021-28712)
   * xen/console: harden hvc_xen against event channel storms (CVE-2021-28713)
   * xen/netback: fix rx queue stall detection (CVE-2021-28714)
   * xen/netback: don't queue unlimited number of packages (CVE-2021-28715)
Checksums-Sha1:
 f94345e5bc6df57ce753e5a1b8290a288cf24d70 7472 linux-signed-arm64_5.16~rc6+1~exp1.dsc
 c29145b205a80bed8f5aee03287b58f8493177fd 2511116 linux-signed-arm64_5.16~rc6+1~exp1.tar.xz
Checksums-Sha256:
 17209c0a27f11d49d14457c5fdb3a20f2676fadef6f278b958430638de2c0e82 7472 linux-signed-arm64_5.16~rc6+1~exp1.dsc
 951dd96b3b78c5a1d6904e652ff8deebb100273a166eb04cb348950a5c895d86 2511116 linux-signed-arm64_5.16~rc6+1~exp1.tar.xz
Files:
 5f8a1dab170b071eb078abeb81c049ba 7472 kernel optional linux-signed-arm64_5.16~rc6+1~exp1.dsc
 99f92ef05b1318599c6fe03b5a96e663 2511116 kernel optional linux-signed-arm64_5.16~rc6+1~exp1.tar.xz

-----BEGIN PGP SIGNATURE-----
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=2s/P
-----END PGP SIGNATURE-----


Reply to: