Thank you for your contribution to Debian.
Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 18 Apr 2026 17:23:19 +0200 Source: linux-signed-arm64 Architecture: source Version: 6.19.13+1 Distribution: sid Urgency: medium Maintainer: Debian Kernel Team <[email protected]> Changed-By: Salvatore Bonaccorso <[email protected]> Changes: linux-signed-arm64 (6.19.13+1) unstable; urgency=medium . * Sign kernel from linux 6.19.13-1 . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.19.13 - usb: typec: ucsi: skip connector validation before init - wifi: rt2x00usb: fix devres lifetime - xfrm_user: fix info leak in build_report() - net: rfkill: prevent unlimited numbers of rfkill events from being created - Revert "ALSA: hda/realtek: Add quirk for Gigabyte Technology to fix headphone" (Closes: #1134201) - ALSA: hda/intel: enforce stricter period-size alignment for Intel NVL - Revert "mptcp: add needs_id for netlink appending addr" - mptcp: fix slab-use-after-free in __inet_lookup_established - seg6: separate dst_cache for input and output paths in seg6 lwtunnel - Input: uinput - fix circular locking dependency with ff-core - Input: uinput - take event lock when submitting FF request "event" - btrfs: remove pointless out labels from extent-tree.c - btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref() - i2c: imx: zero-initialize dma_slave_config for eDMA - netfilter: nft_ct: fix use-after-free in timeout object destroy - firmware: thead: Fix buffer overflow and use standard endian macros - workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works - modpost: Declare extra_warn with unused attribute - xfrm: clear trailing padding in build_polexpire() - xfrm: hold dev ref until after transport_finish NF_HOOK - tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG - [amd64] ASoC: SOF: Intel: hda: modify period size constraints for ACE4 - wifi: brcmsmac: Fix dma_free_coherent() size - [amd64] x86/mce/amd: Filter bogus hardware errors on Zen3 clients - [amd64] platform/x86: ISST: Reset core count to 0 - [amd64] platform/x86/intel-uncore-freq: Handle autonomous UFS status bit - [arm64] Revert "arm64: dts: rockchip: Further describe the WiFi for the Pinebook Pro" - [arm64] Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower" - [arm64] dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V - [arm64] dts: renesas: sparrow-hawk: Reserve first 128 MiB of DRAM - [arm64] dts: hisilicon: poplar: Correct PCIe reset GPIO polarity - [arm64] dts: hisilicon: hi3798cv200: Add missing dma-ranges - nfc: pn533: allocate rx skb before consuming bytes - batman-adv: reject oversized global TT response buffers - X.509: Fix out-of-bounds access when parsing extensions - [amd64,arm64] EDAC/mc: Fix error path ordering in edac_mc_alloc() - net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption - batman-adv: hold claim backbone gateways by reference - [amd64] drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat - [amd64] drm/i915/psr: Do not use pipe_src as borders for SU area - net/mlx5: Update the list of the PCI supported devices - pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled - igb: remove napi_synchronize() in igb_down() - mm/vma: fix memory leak in __mmap_region() - mm/memory_hotplug: maintain N_NORMAL_MEMORY during hotplug - mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails - mm/damon/stat: deallocate damon_call() failure leaking damon_ctx - mmc: vub300: fix NULL-deref on disconnect - mmc: vub300: fix use-after-free on disconnect - net: stmmac: fix integer underflow in chain mode - mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() - [amd64,arm64] idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling - [amd64,arm64] idpf: improve locking around idpf_vc_xn_push_free() - [amd64,arm64] idpf: set the payload size before calling the async handler - rxrpc: Fix key quota calculation for multitoken keys - rxrpc: Fix key parsing memleak - rxrpc: Fix anonymous key handling - rxrpc: Fix call removal to use RCU safe deletion - rxrpc: Fix RxGK token loading to check bounds - rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial - rxrpc: Fix rack timer warning to report unexpected mode - rxrpc: Fix key reference count leak from call->key - rxrpc: Fix to request an ack if window is limited - rxrpc: Only put the call ref if one was acquired - rxrpc: reject undecryptable rxkad response tickets - rxrpc: fix RESPONSE authenticator parser OOB read - rxrpc: fix oversized RESPONSE authenticator length check - rxrpc: fix reference count leak in rxrpc_server_keyring() - rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) - rxrpc: Fix missing error checks for rxkad encryption/decryption failure - rxrpc: Fix integer overflow in rxgk_verify_response() - rxrpc: Fix leak of rxgk context in rxgk_verify_response() - rxrpc: Fix buffer overread in rxgk_do_verify_authenticator() - rxrpc: only handle RESPONSE during service challenge - rxrpc: proc: size address buffers for %pISpc output - net: skb: fix cross-cache free of KFENCE-allocated skb head - [amd64] x86/CPU: Fix FPDSS on Zen1 (CVE-2025-54505) Checksums-Sha1: c1f0e77d92d542079053a108a4a9891eccd22f12 7154 linux-signed-arm64_6.19.13+1.dsc bfee7ad5a6e41de979132e934265d75e5b0c4d93 727624 linux-signed-arm64_6.19.13+1.tar.xz Checksums-Sha256: 2bfd215bb6bb59224d324fcb6a1ff8e37c8b8def1e991051ec2214875bb367d1 7154 linux-signed-arm64_6.19.13+1.dsc 1d4ad483cc29b240dc71bc8284050e74e0ad9cb5d3e67e90f89a803e310f7979 727624 linux-signed-arm64_6.19.13+1.tar.xz Files: 4ab0db8162fe1158957ad10f3cf5421a 7154 kernel optional linux-signed-arm64_6.19.13+1.dsc 78cfe967d9c35d5216e2764bfaa6c3cb 727624 kernel optional linux-signed-arm64_6.19.13+1.tar.xz -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQSInBJdRTWyTRy0ztFCTVFtUgONCgUCaeQKdgAKCRBCTVFtUgON CvU9AQDCnpIQxHoTu5sC9BEFX1DvTd5bqH/IeB6Zda0RRGIfVgEA3SM4KXx6iFaQ eSU9sQ1I/g9piz0gYDJGMTt+GBO6XAg= =CqLa -----END PGP SIGNATURE-----
pgpgXxRUfACFH.pgp
Description: PGP signature

