Debian Package Tracker
Register | Log in
Subscribe

linux

Choose email to subscribe with

general
  • source: linux (main)
  • version: 5.7.6-1
  • maintainer: Debian Kernel Team (archive) (DMD)
  • uploaders: maximilian attems [DMD] – Salvatore Bonaccorso [DMD] – Ben Hutchings [DMD] – Bastian Blank [DMD]
  • arch: all
  • std-ver: 4.2.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.16.56-1+deb8u1
  • o-o-sec: 3.16.84-1
  • oldstable: 4.9.228-1
  • old-sec: 4.9.210-1+deb9u1
  • old-bpo: 4.19.118-2+deb10u1~bpo9+1
  • stable: 4.19.118-2
  • stable-sec: 4.19.118-2+deb10u1
  • stable-bpo: 5.6.14-2~bpo10+1
  • stable-p-u: 4.19.131-2
  • testing: 5.7.6-1
  • unstable: 5.7.6-1
versioned links
  • 3.16.51-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.16.51-3+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.16.56-1+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.16.81-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.16.84-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.9.189-3+deb9u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.9.210-1+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.9.228-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.67-2+deb10u2~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.67-2+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.98-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.98-1+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.118-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.118-2+deb10u1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.118-2+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.19.131-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.4.8-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.4.13-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.4.19-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.5.17-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.6.14-2~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.6.14-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.7.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • acpi-modules-5.7.0-1-686-di
  • acpi-modules-5.7.0-1-686-pae-di
  • acpi-modules-5.7.0-1-amd64-di
  • affs-modules-5.7.0-1-4kc-malta-di
  • affs-modules-5.7.0-1-5kc-malta-di
  • affs-modules-5.7.0-1-loongson-3-di
  • affs-modules-5.7.0-1-m68k-di
  • affs-modules-5.7.0-1-octeon-di
  • affs-modules-5.7.0-1-powerpc-di
  • affs-modules-5.7.0-1-powerpc64-di
  • ata-modules-5.7.0-1-4kc-malta-di
  • ata-modules-5.7.0-1-5kc-malta-di
  • ata-modules-5.7.0-1-686-di
  • ata-modules-5.7.0-1-686-pae-di
  • ata-modules-5.7.0-1-alpha-generic-di
  • ata-modules-5.7.0-1-amd64-di
  • ata-modules-5.7.0-1-arm64-di
  • ata-modules-5.7.0-1-armmp-di
  • ata-modules-5.7.0-1-itanium-di
  • ata-modules-5.7.0-1-loongson-3-di
  • ata-modules-5.7.0-1-m68k-di
  • ata-modules-5.7.0-1-parisc-di
  • ata-modules-5.7.0-1-parisc64-di
  • ata-modules-5.7.0-1-powerpc-di
  • ata-modules-5.7.0-1-powerpc64-di
  • ata-modules-5.7.0-1-powerpc64le-di
  • ata-modules-5.7.0-1-riscv64-di
  • ata-modules-5.7.0-1-sparc64-di
  • btrfs-modules-5.7.0-1-4kc-malta-di
  • btrfs-modules-5.7.0-1-5kc-malta-di
  • btrfs-modules-5.7.0-1-686-di
  • btrfs-modules-5.7.0-1-686-pae-di
  • btrfs-modules-5.7.0-1-alpha-generic-di
  • btrfs-modules-5.7.0-1-amd64-di
  • btrfs-modules-5.7.0-1-arm64-di
  • btrfs-modules-5.7.0-1-armmp-di
  • btrfs-modules-5.7.0-1-itanium-di
  • btrfs-modules-5.7.0-1-loongson-3-di
  • btrfs-modules-5.7.0-1-m68k-di
  • btrfs-modules-5.7.0-1-marvell-di
  • btrfs-modules-5.7.0-1-mips32r6-di
  • btrfs-modules-5.7.0-1-mips32r6el-di
  • btrfs-modules-5.7.0-1-mips64r6-di
  • btrfs-modules-5.7.0-1-mips64r6el-di
  • btrfs-modules-5.7.0-1-octeon-di
  • btrfs-modules-5.7.0-1-parisc-di
  • btrfs-modules-5.7.0-1-parisc64-di
  • btrfs-modules-5.7.0-1-powerpc-di
  • btrfs-modules-5.7.0-1-powerpc64-di
  • btrfs-modules-5.7.0-1-powerpc64le-di
  • btrfs-modules-5.7.0-1-riscv64-di
  • btrfs-modules-5.7.0-1-s390x-di
  • btrfs-modules-5.7.0-1-sh7751r-di
  • btrfs-modules-5.7.0-1-sh7785lcr-di
  • btrfs-modules-5.7.0-1-sparc64-di
  • cdrom-core-modules-5.7.0-1-4kc-malta-di
  • cdrom-core-modules-5.7.0-1-5kc-malta-di
  • cdrom-core-modules-5.7.0-1-686-di
  • cdrom-core-modules-5.7.0-1-686-pae-di
  • cdrom-core-modules-5.7.0-1-alpha-generic-di
  • cdrom-core-modules-5.7.0-1-amd64-di
  • cdrom-core-modules-5.7.0-1-arm64-di
  • cdrom-core-modules-5.7.0-1-armmp-di
  • cdrom-core-modules-5.7.0-1-itanium-di
  • cdrom-core-modules-5.7.0-1-loongson-3-di
  • cdrom-core-modules-5.7.0-1-m68k-di
  • cdrom-core-modules-5.7.0-1-marvell-di
  • cdrom-core-modules-5.7.0-1-octeon-di
  • cdrom-core-modules-5.7.0-1-parisc-di
  • cdrom-core-modules-5.7.0-1-parisc64-di
  • cdrom-core-modules-5.7.0-1-powerpc-di
  • cdrom-core-modules-5.7.0-1-powerpc64-di
  • cdrom-core-modules-5.7.0-1-powerpc64le-di
  • cdrom-core-modules-5.7.0-1-riscv64-di
  • cdrom-core-modules-5.7.0-1-s390x-di
  • cdrom-core-modules-5.7.0-1-sh7751r-di
  • cdrom-core-modules-5.7.0-1-sh7785lcr-di
  • cdrom-core-modules-5.7.0-1-sparc64-di
  • compress-modules-5.7.0-1-4kc-malta-di
  • compress-modules-5.7.0-1-5kc-malta-di
  • compress-modules-5.7.0-1-686-di
  • compress-modules-5.7.0-1-686-pae-di
  • compress-modules-5.7.0-1-alpha-generic-di
  • compress-modules-5.7.0-1-amd64-di
  • compress-modules-5.7.0-1-arm64-di
  • compress-modules-5.7.0-1-armmp-di
  • compress-modules-5.7.0-1-itanium-di
  • compress-modules-5.7.0-1-loongson-3-di
  • compress-modules-5.7.0-1-m68k-di
  • compress-modules-5.7.0-1-marvell-di
  • compress-modules-5.7.0-1-mips32r6-di
  • compress-modules-5.7.0-1-mips32r6el-di
  • compress-modules-5.7.0-1-mips64r6-di
  • compress-modules-5.7.0-1-mips64r6el-di
  • compress-modules-5.7.0-1-octeon-di
  • compress-modules-5.7.0-1-parisc-di
  • compress-modules-5.7.0-1-parisc64-di
  • compress-modules-5.7.0-1-powerpc-di
  • compress-modules-5.7.0-1-powerpc64-di
  • compress-modules-5.7.0-1-powerpc64le-di
  • compress-modules-5.7.0-1-riscv64-di
  • compress-modules-5.7.0-1-s390x-di
  • compress-modules-5.7.0-1-sh7751r-di
  • compress-modules-5.7.0-1-sh7785lcr-di
  • compress-modules-5.7.0-1-sparc64-di
  • crc-modules-5.7.0-1-4kc-malta-di
  • crc-modules-5.7.0-1-5kc-malta-di
  • crc-modules-5.7.0-1-686-di
  • crc-modules-5.7.0-1-686-pae-di
  • crc-modules-5.7.0-1-alpha-generic-di
  • crc-modules-5.7.0-1-amd64-di
  • crc-modules-5.7.0-1-arm64-di
  • crc-modules-5.7.0-1-armmp-di
  • crc-modules-5.7.0-1-itanium-di
  • crc-modules-5.7.0-1-loongson-3-di
  • crc-modules-5.7.0-1-m68k-di
  • crc-modules-5.7.0-1-marvell-di
  • crc-modules-5.7.0-1-mips32r6-di
  • crc-modules-5.7.0-1-mips32r6el-di
  • crc-modules-5.7.0-1-mips64r6-di
  • crc-modules-5.7.0-1-mips64r6el-di
  • crc-modules-5.7.0-1-octeon-di
  • crc-modules-5.7.0-1-parisc-di
  • crc-modules-5.7.0-1-parisc64-di
  • crc-modules-5.7.0-1-powerpc-di
  • crc-modules-5.7.0-1-powerpc64-di
  • crc-modules-5.7.0-1-powerpc64le-di
  • crc-modules-5.7.0-1-riscv64-di
  • crc-modules-5.7.0-1-s390x-di
  • crc-modules-5.7.0-1-sh7751r-di
  • crc-modules-5.7.0-1-sh7785lcr-di
  • crc-modules-5.7.0-1-sparc64-di
  • crypto-dm-modules-5.7.0-1-4kc-malta-di
  • crypto-dm-modules-5.7.0-1-5kc-malta-di
  • crypto-dm-modules-5.7.0-1-686-di
  • crypto-dm-modules-5.7.0-1-686-pae-di
  • crypto-dm-modules-5.7.0-1-alpha-generic-di
  • crypto-dm-modules-5.7.0-1-amd64-di
  • crypto-dm-modules-5.7.0-1-arm64-di
  • crypto-dm-modules-5.7.0-1-armmp-di
  • crypto-dm-modules-5.7.0-1-itanium-di
  • crypto-dm-modules-5.7.0-1-loongson-3-di
  • crypto-dm-modules-5.7.0-1-marvell-di
  • crypto-dm-modules-5.7.0-1-mips32r6-di
  • crypto-dm-modules-5.7.0-1-mips32r6el-di
  • crypto-dm-modules-5.7.0-1-mips64r6-di
  • crypto-dm-modules-5.7.0-1-mips64r6el-di
  • crypto-dm-modules-5.7.0-1-octeon-di
  • crypto-dm-modules-5.7.0-1-parisc-di
  • crypto-dm-modules-5.7.0-1-parisc64-di
  • crypto-dm-modules-5.7.0-1-powerpc-di
  • crypto-dm-modules-5.7.0-1-powerpc64-di
  • crypto-dm-modules-5.7.0-1-powerpc64le-di
  • crypto-dm-modules-5.7.0-1-riscv64-di
  • crypto-dm-modules-5.7.0-1-s390x-di
  • crypto-dm-modules-5.7.0-1-sh7751r-di
  • crypto-dm-modules-5.7.0-1-sh7785lcr-di
  • crypto-dm-modules-5.7.0-1-sparc64-di
  • crypto-modules-5.7.0-1-4kc-malta-di
  • crypto-modules-5.7.0-1-5kc-malta-di
  • crypto-modules-5.7.0-1-686-di
  • crypto-modules-5.7.0-1-686-pae-di
  • crypto-modules-5.7.0-1-alpha-generic-di
  • crypto-modules-5.7.0-1-amd64-di
  • crypto-modules-5.7.0-1-arm64-di
  • crypto-modules-5.7.0-1-armmp-di
  • crypto-modules-5.7.0-1-itanium-di
  • crypto-modules-5.7.0-1-loongson-3-di
  • crypto-modules-5.7.0-1-m68k-di
  • crypto-modules-5.7.0-1-marvell-di
  • crypto-modules-5.7.0-1-mips32r6-di
  • crypto-modules-5.7.0-1-mips32r6el-di
  • crypto-modules-5.7.0-1-mips64r6-di
  • crypto-modules-5.7.0-1-mips64r6el-di
  • crypto-modules-5.7.0-1-octeon-di
  • crypto-modules-5.7.0-1-parisc-di
  • crypto-modules-5.7.0-1-parisc64-di
  • crypto-modules-5.7.0-1-powerpc-di
  • crypto-modules-5.7.0-1-powerpc64-di
  • crypto-modules-5.7.0-1-powerpc64le-di
  • crypto-modules-5.7.0-1-riscv64-di
  • crypto-modules-5.7.0-1-s390x-di
  • crypto-modules-5.7.0-1-sh7751r-di
  • crypto-modules-5.7.0-1-sh7785lcr-di
  • crypto-modules-5.7.0-1-sparc64-di
  • dasd-extra-modules-5.7.0-1-s390x-di
  • dasd-modules-5.7.0-1-s390x-di
  • efi-modules-5.7.0-1-686-di
  • efi-modules-5.7.0-1-686-pae-di
  • efi-modules-5.7.0-1-amd64-di
  • efi-modules-5.7.0-1-arm64-di
  • efi-modules-5.7.0-1-armmp-di
  • event-modules-5.7.0-1-4kc-malta-di
  • event-modules-5.7.0-1-5kc-malta-di
  • event-modules-5.7.0-1-686-di
  • event-modules-5.7.0-1-686-pae-di
  • event-modules-5.7.0-1-alpha-generic-di
  • event-modules-5.7.0-1-amd64-di
  • event-modules-5.7.0-1-arm64-di
  • event-modules-5.7.0-1-armmp-di
  • event-modules-5.7.0-1-itanium-di
  • event-modules-5.7.0-1-loongson-3-di
  • event-modules-5.7.0-1-marvell-di
  • event-modules-5.7.0-1-octeon-di
  • event-modules-5.7.0-1-parisc-di
  • event-modules-5.7.0-1-parisc64-di
  • event-modules-5.7.0-1-powerpc-di
  • event-modules-5.7.0-1-powerpc64-di
  • event-modules-5.7.0-1-powerpc64le-di
  • event-modules-5.7.0-1-riscv64-di
  • ext4-modules-5.7.0-1-4kc-malta-di
  • ext4-modules-5.7.0-1-5kc-malta-di
  • ext4-modules-5.7.0-1-686-di
  • ext4-modules-5.7.0-1-686-pae-di
  • ext4-modules-5.7.0-1-alpha-generic-di
  • ext4-modules-5.7.0-1-amd64-di
  • ext4-modules-5.7.0-1-arm64-di
  • ext4-modules-5.7.0-1-armmp-di
  • ext4-modules-5.7.0-1-itanium-di
  • ext4-modules-5.7.0-1-loongson-3-di
  • ext4-modules-5.7.0-1-m68k-di
  • ext4-modules-5.7.0-1-marvell-di
  • ext4-modules-5.7.0-1-mips32r6-di
  • ext4-modules-5.7.0-1-mips32r6el-di
  • ext4-modules-5.7.0-1-mips64r6-di
  • ext4-modules-5.7.0-1-mips64r6el-di
  • ext4-modules-5.7.0-1-octeon-di
  • ext4-modules-5.7.0-1-parisc-di
  • ext4-modules-5.7.0-1-parisc64-di
  • ext4-modules-5.7.0-1-powerpc-di
  • ext4-modules-5.7.0-1-powerpc64-di
  • ext4-modules-5.7.0-1-powerpc64le-di
  • ext4-modules-5.7.0-1-riscv64-di
  • ext4-modules-5.7.0-1-s390x-di
  • ext4-modules-5.7.0-1-sh7751r-di
  • ext4-modules-5.7.0-1-sh7785lcr-di
  • ext4-modules-5.7.0-1-sparc64-di
  • f2fs-modules-5.7.0-1-4kc-malta-di
  • f2fs-modules-5.7.0-1-5kc-malta-di
  • f2fs-modules-5.7.0-1-686-di
  • f2fs-modules-5.7.0-1-686-pae-di
  • f2fs-modules-5.7.0-1-alpha-generic-di
  • f2fs-modules-5.7.0-1-amd64-di
  • f2fs-modules-5.7.0-1-arm64-di
  • f2fs-modules-5.7.0-1-armmp-di
  • f2fs-modules-5.7.0-1-itanium-di
  • f2fs-modules-5.7.0-1-loongson-3-di
  • f2fs-modules-5.7.0-1-marvell-di
  • f2fs-modules-5.7.0-1-mips32r6-di
  • f2fs-modules-5.7.0-1-mips32r6el-di
  • f2fs-modules-5.7.0-1-mips64r6-di
  • f2fs-modules-5.7.0-1-mips64r6el-di
  • f2fs-modules-5.7.0-1-octeon-di
  • f2fs-modules-5.7.0-1-parisc-di
  • f2fs-modules-5.7.0-1-parisc64-di
  • f2fs-modules-5.7.0-1-powerpc-di
  • f2fs-modules-5.7.0-1-powerpc64-di
  • f2fs-modules-5.7.0-1-powerpc64le-di
  • f2fs-modules-5.7.0-1-riscv64-di
  • f2fs-modules-5.7.0-1-s390x-di
  • f2fs-modules-5.7.0-1-sh7751r-di
  • f2fs-modules-5.7.0-1-sh7785lcr-di
  • f2fs-modules-5.7.0-1-sparc64-di
  • fancontrol-modules-5.7.0-1-powerpc64-di
  • fancontrol-modules-5.7.0-1-powerpc64le-di
  • fat-modules-5.7.0-1-4kc-malta-di
  • fat-modules-5.7.0-1-5kc-malta-di
  • fat-modules-5.7.0-1-686-di
  • fat-modules-5.7.0-1-686-pae-di
  • fat-modules-5.7.0-1-alpha-generic-di
  • fat-modules-5.7.0-1-amd64-di
  • fat-modules-5.7.0-1-arm64-di
  • fat-modules-5.7.0-1-armmp-di
  • fat-modules-5.7.0-1-itanium-di
  • fat-modules-5.7.0-1-loongson-3-di
  • fat-modules-5.7.0-1-m68k-di
  • fat-modules-5.7.0-1-marvell-di
  • fat-modules-5.7.0-1-octeon-di
  • fat-modules-5.7.0-1-parisc-di
  • fat-modules-5.7.0-1-parisc64-di
  • fat-modules-5.7.0-1-powerpc-di
  • fat-modules-5.7.0-1-powerpc64-di
  • fat-modules-5.7.0-1-powerpc64le-di
  • fat-modules-5.7.0-1-riscv64-di
  • fat-modules-5.7.0-1-s390x-di
  • fat-modules-5.7.0-1-sh7751r-di
  • fat-modules-5.7.0-1-sh7785lcr-di
  • fat-modules-5.7.0-1-sparc64-di
  • fb-modules-5.7.0-1-4kc-malta-di
  • fb-modules-5.7.0-1-5kc-malta-di
  • fb-modules-5.7.0-1-686-di
  • fb-modules-5.7.0-1-686-pae-di
  • fb-modules-5.7.0-1-alpha-generic-di
  • fb-modules-5.7.0-1-amd64-di
  • fb-modules-5.7.0-1-arm64-di
  • fb-modules-5.7.0-1-armmp-di
  • fb-modules-5.7.0-1-itanium-di
  • fb-modules-5.7.0-1-loongson-3-di
  • fb-modules-5.7.0-1-marvell-di
  • fb-modules-5.7.0-1-parisc64-di
  • fb-modules-5.7.0-1-powerpc-di
  • fb-modules-5.7.0-1-powerpc64-di
  • fb-modules-5.7.0-1-powerpc64le-di
  • fb-modules-5.7.0-1-riscv64-di
  • fb-modules-5.7.0-1-sparc64-di
  • firewire-core-modules-5.7.0-1-686-di
  • firewire-core-modules-5.7.0-1-686-pae-di
  • firewire-core-modules-5.7.0-1-amd64-di
  • firewire-core-modules-5.7.0-1-itanium-di
  • firewire-core-modules-5.7.0-1-loongson-3-di
  • firewire-core-modules-5.7.0-1-powerpc-di
  • firewire-core-modules-5.7.0-1-powerpc64-di
  • firewire-core-modules-5.7.0-1-powerpc64le-di
  • firewire-core-modules-5.7.0-1-sh7751r-di
  • firewire-core-modules-5.7.0-1-sh7785lcr-di
  • fuse-modules-5.7.0-1-4kc-malta-di
  • fuse-modules-5.7.0-1-5kc-malta-di
  • fuse-modules-5.7.0-1-686-di
  • fuse-modules-5.7.0-1-686-pae-di
  • fuse-modules-5.7.0-1-alpha-generic-di
  • fuse-modules-5.7.0-1-amd64-di
  • fuse-modules-5.7.0-1-arm64-di
  • fuse-modules-5.7.0-1-armmp-di
  • fuse-modules-5.7.0-1-itanium-di
  • fuse-modules-5.7.0-1-loongson-3-di
  • fuse-modules-5.7.0-1-m68k-di
  • fuse-modules-5.7.0-1-marvell-di
  • fuse-modules-5.7.0-1-mips32r6-di
  • fuse-modules-5.7.0-1-mips32r6el-di
  • fuse-modules-5.7.0-1-mips64r6-di
  • fuse-modules-5.7.0-1-mips64r6el-di
  • fuse-modules-5.7.0-1-octeon-di
  • fuse-modules-5.7.0-1-parisc-di
  • fuse-modules-5.7.0-1-parisc64-di
  • fuse-modules-5.7.0-1-powerpc-di
  • fuse-modules-5.7.0-1-powerpc64-di
  • fuse-modules-5.7.0-1-powerpc64le-di
  • fuse-modules-5.7.0-1-riscv64-di
  • fuse-modules-5.7.0-1-s390x-di
  • fuse-modules-5.7.0-1-sh7751r-di
  • fuse-modules-5.7.0-1-sh7785lcr-di
  • fuse-modules-5.7.0-1-sparc64-di
  • hfs-modules-5.7.0-1-4kc-malta-di
  • hfs-modules-5.7.0-1-5kc-malta-di
  • hfs-modules-5.7.0-1-loongson-3-di
  • hfs-modules-5.7.0-1-m68k-di
  • hfs-modules-5.7.0-1-octeon-di
  • hfs-modules-5.7.0-1-powerpc-di
  • hfs-modules-5.7.0-1-powerpc64-di
  • hyperv-daemons (3 bugs: 0, 2, 1, 0)
  • hypervisor-modules-5.7.0-1-powerpc64-di
  • hypervisor-modules-5.7.0-1-powerpc64le-di
  • i2c-modules-5.7.0-1-4kc-malta-di
  • i2c-modules-5.7.0-1-5kc-malta-di
  • i2c-modules-5.7.0-1-686-di
  • i2c-modules-5.7.0-1-686-pae-di
  • i2c-modules-5.7.0-1-alpha-generic-di
  • i2c-modules-5.7.0-1-amd64-di
  • i2c-modules-5.7.0-1-arm64-di
  • i2c-modules-5.7.0-1-armmp-di
  • i2c-modules-5.7.0-1-itanium-di
  • i2c-modules-5.7.0-1-powerpc64-di
  • i2c-modules-5.7.0-1-powerpc64le-di
  • i2c-modules-5.7.0-1-riscv64-di
  • i2c-modules-5.7.0-1-sh7751r-di
  • i2c-modules-5.7.0-1-sparc64-di
  • ide-core-modules-5.7.0-1-itanium-di
  • ide-core-modules-5.7.0-1-m68k-di
  • ide-modules-5.7.0-1-itanium-di
  • ide-modules-5.7.0-1-m68k-di
  • input-modules-5.7.0-1-4kc-malta-di
  • input-modules-5.7.0-1-5kc-malta-di
  • input-modules-5.7.0-1-686-di
  • input-modules-5.7.0-1-686-pae-di
  • input-modules-5.7.0-1-alpha-generic-di
  • input-modules-5.7.0-1-amd64-di
  • input-modules-5.7.0-1-arm64-di
  • input-modules-5.7.0-1-armmp-di
  • input-modules-5.7.0-1-itanium-di
  • input-modules-5.7.0-1-loongson-3-di
  • input-modules-5.7.0-1-marvell-di
  • input-modules-5.7.0-1-octeon-di
  • input-modules-5.7.0-1-parisc-di
  • input-modules-5.7.0-1-parisc64-di
  • input-modules-5.7.0-1-powerpc-di
  • input-modules-5.7.0-1-powerpc64-di
  • input-modules-5.7.0-1-powerpc64le-di
  • input-modules-5.7.0-1-riscv64-di
  • input-modules-5.7.0-1-sparc64-di
  • ipv6-modules-5.7.0-1-marvell-di
  • isofs-modules-5.7.0-1-4kc-malta-di
  • isofs-modules-5.7.0-1-5kc-malta-di
  • isofs-modules-5.7.0-1-686-di
  • isofs-modules-5.7.0-1-686-pae-di
  • isofs-modules-5.7.0-1-alpha-generic-di
  • isofs-modules-5.7.0-1-amd64-di
  • isofs-modules-5.7.0-1-arm64-di
  • isofs-modules-5.7.0-1-armmp-di
  • isofs-modules-5.7.0-1-itanium-di
  • isofs-modules-5.7.0-1-loongson-3-di
  • isofs-modules-5.7.0-1-m68k-di
  • isofs-modules-5.7.0-1-marvell-di
  • isofs-modules-5.7.0-1-mips32r6-di
  • isofs-modules-5.7.0-1-mips32r6el-di
  • isofs-modules-5.7.0-1-mips64r6-di
  • isofs-modules-5.7.0-1-mips64r6el-di
  • isofs-modules-5.7.0-1-octeon-di
  • isofs-modules-5.7.0-1-parisc-di
  • isofs-modules-5.7.0-1-parisc64-di
  • isofs-modules-5.7.0-1-powerpc-di
  • isofs-modules-5.7.0-1-powerpc64-di
  • isofs-modules-5.7.0-1-powerpc64le-di
  • isofs-modules-5.7.0-1-riscv64-di
  • isofs-modules-5.7.0-1-s390x-di
  • isofs-modules-5.7.0-1-sh7751r-di
  • isofs-modules-5.7.0-1-sh7785lcr-di
  • isofs-modules-5.7.0-1-sparc64-di
  • jffs2-modules-5.7.0-1-marvell-di
  • jfs-modules-5.7.0-1-4kc-malta-di
  • jfs-modules-5.7.0-1-5kc-malta-di
  • jfs-modules-5.7.0-1-686-di
  • jfs-modules-5.7.0-1-686-pae-di
  • jfs-modules-5.7.0-1-alpha-generic-di
  • jfs-modules-5.7.0-1-amd64-di
  • jfs-modules-5.7.0-1-arm64-di
  • jfs-modules-5.7.0-1-armmp-di
  • jfs-modules-5.7.0-1-itanium-di
  • jfs-modules-5.7.0-1-loongson-3-di
  • jfs-modules-5.7.0-1-marvell-di
  • jfs-modules-5.7.0-1-mips32r6-di
  • jfs-modules-5.7.0-1-mips32r6el-di
  • jfs-modules-5.7.0-1-mips64r6-di
  • jfs-modules-5.7.0-1-mips64r6el-di
  • jfs-modules-5.7.0-1-octeon-di
  • jfs-modules-5.7.0-1-parisc-di
  • jfs-modules-5.7.0-1-parisc64-di
  • jfs-modules-5.7.0-1-powerpc-di
  • jfs-modules-5.7.0-1-powerpc64-di
  • jfs-modules-5.7.0-1-powerpc64le-di
  • jfs-modules-5.7.0-1-riscv64-di
  • jfs-modules-5.7.0-1-sh7751r-di
  • jfs-modules-5.7.0-1-sh7785lcr-di
  • jfs-modules-5.7.0-1-sparc64-di
  • kernel-image-5.7.0-1-4kc-malta-di
  • kernel-image-5.7.0-1-5kc-malta-di
  • kernel-image-5.7.0-1-686-di
  • kernel-image-5.7.0-1-686-pae-di
  • kernel-image-5.7.0-1-alpha-generic-di
  • kernel-image-5.7.0-1-amd64-di
  • kernel-image-5.7.0-1-arm64-di
  • kernel-image-5.7.0-1-armmp-di
  • kernel-image-5.7.0-1-itanium-di
  • kernel-image-5.7.0-1-loongson-3-di
  • kernel-image-5.7.0-1-m68k-di
  • kernel-image-5.7.0-1-marvell-di
  • kernel-image-5.7.0-1-mips32r6-di
  • kernel-image-5.7.0-1-mips32r6el-di
  • kernel-image-5.7.0-1-mips64r6-di
  • kernel-image-5.7.0-1-mips64r6el-di
  • kernel-image-5.7.0-1-octeon-di
  • kernel-image-5.7.0-1-parisc-di
  • kernel-image-5.7.0-1-parisc64-di
  • kernel-image-5.7.0-1-powerpc-di
  • kernel-image-5.7.0-1-powerpc64-di
  • kernel-image-5.7.0-1-powerpc64le-di
  • kernel-image-5.7.0-1-riscv64-di
  • kernel-image-5.7.0-1-s390x-di
  • kernel-image-5.7.0-1-sh7751r-di
  • kernel-image-5.7.0-1-sh7785lcr-di
  • kernel-image-5.7.0-1-sparc64-di
  • leds-modules-5.7.0-1-arm64-di
  • leds-modules-5.7.0-1-armmp-di
  • leds-modules-5.7.0-1-marvell-di
  • libcpupower-dev
  • libcpupower1
  • libtraceevent-dev
  • libtraceevent1
  • libtraceevent1-plugin
  • linux-bootwrapper-5.7.0-1
  • linux-compiler-gcc-9-arm
  • linux-compiler-gcc-9-s390
  • linux-compiler-gcc-9-x86
  • linux-config-5.7
  • linux-cpupower (2 bugs: 0, 1, 1, 0)
  • linux-doc
  • linux-doc-5.7
  • linux-headers-4kc-malta
  • linux-headers-5.7.0-1-4kc-malta
  • linux-headers-5.7.0-1-5kc-malta
  • linux-headers-5.7.0-1-686
  • linux-headers-5.7.0-1-686-pae
  • linux-headers-5.7.0-1-alpha-generic
  • linux-headers-5.7.0-1-alpha-smp
  • linux-headers-5.7.0-1-amd64
  • linux-headers-5.7.0-1-arm64
  • linux-headers-5.7.0-1-armmp
  • linux-headers-5.7.0-1-armmp-lpae
  • linux-headers-5.7.0-1-cloud-amd64
  • linux-headers-5.7.0-1-cloud-arm64
  • linux-headers-5.7.0-1-common
  • linux-headers-5.7.0-1-itanium
  • linux-headers-5.7.0-1-loongson-3
  • linux-headers-5.7.0-1-m68k
  • linux-headers-5.7.0-1-marvell
  • linux-headers-5.7.0-1-mckinley
  • linux-headers-5.7.0-1-mips32r6
  • linux-headers-5.7.0-1-mips32r6el
  • linux-headers-5.7.0-1-mips64r6
  • linux-headers-5.7.0-1-mips64r6el
  • linux-headers-5.7.0-1-octeon
  • linux-headers-5.7.0-1-parisc
  • linux-headers-5.7.0-1-parisc64
  • linux-headers-5.7.0-1-powerpc
  • linux-headers-5.7.0-1-powerpc-smp
  • linux-headers-5.7.0-1-powerpc64
  • linux-headers-5.7.0-1-powerpc64le
  • linux-headers-5.7.0-1-riscv64
  • linux-headers-5.7.0-1-rpi
  • linux-headers-5.7.0-1-s390x
  • linux-headers-5.7.0-1-sh7751r
  • linux-headers-5.7.0-1-sh7785lcr
  • linux-headers-5.7.0-1-sparc64
  • linux-headers-5.7.0-1-sparc64-smp
  • linux-headers-5kc-malta
  • linux-headers-alpha-generic
  • linux-headers-alpha-smp
  • linux-headers-armmp
  • linux-headers-armmp-lpae
  • linux-headers-itanium
  • linux-headers-loongson-3
  • linux-headers-m68k
  • linux-headers-marvell
  • linux-headers-mckinley
  • linux-headers-mips32r6
  • linux-headers-mips32r6el
  • linux-headers-mips64r6
  • linux-headers-mips64r6el
  • linux-headers-octeon
  • linux-headers-parisc
  • linux-headers-parisc64
  • linux-headers-powerpc
  • linux-headers-powerpc-smp
  • linux-headers-powerpc64
  • linux-headers-powerpc64le
  • linux-headers-riscv64
  • linux-headers-rpi
  • linux-headers-s390x
  • linux-headers-sh7751r
  • linux-headers-sh7785lcr
  • linux-headers-sparc64
  • linux-headers-sparc64-smp
  • linux-image-4kc-malta
  • linux-image-4kc-malta-dbg
  • linux-image-5.7.0-1-4kc-malta
  • linux-image-5.7.0-1-4kc-malta-dbg
  • linux-image-5.7.0-1-5kc-malta
  • linux-image-5.7.0-1-5kc-malta-dbg
  • linux-image-5.7.0-1-686-dbg
  • linux-image-5.7.0-1-686-pae-dbg
  • linux-image-5.7.0-1-686-pae-unsigned
  • linux-image-5.7.0-1-686-unsigned
  • linux-image-5.7.0-1-alpha-generic
  • linux-image-5.7.0-1-alpha-generic-dbg
  • linux-image-5.7.0-1-alpha-smp
  • linux-image-5.7.0-1-alpha-smp-dbg
  • linux-image-5.7.0-1-amd64-dbg
  • linux-image-5.7.0-1-amd64-unsigned
  • linux-image-5.7.0-1-arm64-dbg
  • linux-image-5.7.0-1-arm64-unsigned
  • linux-image-5.7.0-1-armmp
  • linux-image-5.7.0-1-armmp-dbg
  • linux-image-5.7.0-1-armmp-lpae
  • linux-image-5.7.0-1-armmp-lpae-dbg
  • linux-image-5.7.0-1-cloud-amd64-dbg
  • linux-image-5.7.0-1-cloud-amd64-unsigned
  • linux-image-5.7.0-1-cloud-arm64-dbg
  • linux-image-5.7.0-1-cloud-arm64-unsigned
  • linux-image-5.7.0-1-itanium
  • linux-image-5.7.0-1-itanium-dbg
  • linux-image-5.7.0-1-loongson-3
  • linux-image-5.7.0-1-loongson-3-dbg
  • linux-image-5.7.0-1-m68k
  • linux-image-5.7.0-1-m68k-dbg
  • linux-image-5.7.0-1-marvell
  • linux-image-5.7.0-1-marvell-dbg
  • linux-image-5.7.0-1-mckinley
  • linux-image-5.7.0-1-mckinley-dbg
  • linux-image-5.7.0-1-mips32r6
  • linux-image-5.7.0-1-mips32r6-dbg
  • linux-image-5.7.0-1-mips32r6el
  • linux-image-5.7.0-1-mips32r6el-dbg
  • linux-image-5.7.0-1-mips64r6
  • linux-image-5.7.0-1-mips64r6-dbg
  • linux-image-5.7.0-1-mips64r6el
  • linux-image-5.7.0-1-mips64r6el-dbg
  • linux-image-5.7.0-1-octeon
  • linux-image-5.7.0-1-octeon-dbg
  • linux-image-5.7.0-1-parisc
  • linux-image-5.7.0-1-parisc64
  • linux-image-5.7.0-1-powerpc
  • linux-image-5.7.0-1-powerpc-dbg
  • linux-image-5.7.0-1-powerpc-smp
  • linux-image-5.7.0-1-powerpc-smp-dbg
  • linux-image-5.7.0-1-powerpc64
  • linux-image-5.7.0-1-powerpc64-dbg
  • linux-image-5.7.0-1-powerpc64le
  • linux-image-5.7.0-1-powerpc64le-dbg
  • linux-image-5.7.0-1-riscv64
  • linux-image-5.7.0-1-riscv64-dbg
  • linux-image-5.7.0-1-rpi
  • linux-image-5.7.0-1-rpi-dbg
  • linux-image-5.7.0-1-s390x
  • linux-image-5.7.0-1-s390x-dbg
  • linux-image-5.7.0-1-sh7751r
  • linux-image-5.7.0-1-sh7751r-dbg
  • linux-image-5.7.0-1-sh7785lcr
  • linux-image-5.7.0-1-sh7785lcr-dbg
  • linux-image-5.7.0-1-sparc64
  • linux-image-5.7.0-1-sparc64-dbg
  • linux-image-5.7.0-1-sparc64-smp
  • linux-image-5.7.0-1-sparc64-smp-dbg
  • linux-image-5kc-malta
  • linux-image-5kc-malta-dbg
  • linux-image-686-dbg
  • linux-image-686-pae-dbg
  • linux-image-alpha-generic
  • linux-image-alpha-generic-dbg
  • linux-image-alpha-smp
  • linux-image-alpha-smp-dbg
  • linux-image-amd64-dbg
  • linux-image-amd64-signed-template
  • linux-image-arm64-dbg
  • linux-image-arm64-signed-template
  • linux-image-armmp
  • linux-image-armmp-dbg
  • linux-image-armmp-lpae
  • linux-image-armmp-lpae-dbg
  • linux-image-cloud-amd64-dbg
  • linux-image-cloud-arm64-dbg
  • linux-image-i386-signed-template
  • linux-image-itanium
  • linux-image-itanium-dbg
  • linux-image-loongson-3
  • linux-image-loongson-3-dbg
  • linux-image-m68k
  • linux-image-m68k-dbg
  • linux-image-marvell
  • linux-image-marvell-dbg
  • linux-image-mckinley
  • linux-image-mckinley-dbg
  • linux-image-mips32r6
  • linux-image-mips32r6-dbg
  • linux-image-mips32r6el
  • linux-image-mips32r6el-dbg
  • linux-image-mips64r6
  • linux-image-mips64r6-dbg
  • linux-image-mips64r6el
  • linux-image-mips64r6el-dbg
  • linux-image-octeon
  • linux-image-octeon-dbg
  • linux-image-parisc
  • linux-image-parisc64
  • linux-image-powerpc
  • linux-image-powerpc-dbg
  • linux-image-powerpc-smp
  • linux-image-powerpc-smp-dbg
  • linux-image-powerpc64
  • linux-image-powerpc64-dbg
  • linux-image-powerpc64le
  • linux-image-powerpc64le-dbg
  • linux-image-riscv64
  • linux-image-riscv64-dbg
  • linux-image-rpi
  • linux-image-rpi-dbg
  • linux-image-s390x
  • linux-image-s390x-dbg
  • linux-image-sh7751r
  • linux-image-sh7751r-dbg
  • linux-image-sh7785lcr
  • linux-image-sh7785lcr-dbg
  • linux-image-sparc64
  • linux-image-sparc64-dbg
  • linux-image-sparc64-smp
  • linux-image-sparc64-smp-dbg
  • linux-kbuild-5.7
  • linux-libc-dev (11 bugs: 0, 8, 3, 0)
  • linux-perf
  • linux-perf-5.7
  • linux-source (1 bugs: 0, 0, 1, 0)
  • linux-source-5.7
  • linux-support-5.7.0-1
  • loop-modules-5.7.0-1-4kc-malta-di
  • loop-modules-5.7.0-1-5kc-malta-di
  • loop-modules-5.7.0-1-686-di
  • loop-modules-5.7.0-1-686-pae-di
  • loop-modules-5.7.0-1-alpha-generic-di
  • loop-modules-5.7.0-1-amd64-di
  • loop-modules-5.7.0-1-arm64-di
  • loop-modules-5.7.0-1-armmp-di
  • loop-modules-5.7.0-1-itanium-di
  • loop-modules-5.7.0-1-loongson-3-di
  • loop-modules-5.7.0-1-m68k-di
  • loop-modules-5.7.0-1-marvell-di
  • loop-modules-5.7.0-1-mips32r6-di
  • loop-modules-5.7.0-1-mips32r6el-di
  • loop-modules-5.7.0-1-mips64r6-di
  • loop-modules-5.7.0-1-mips64r6el-di
  • loop-modules-5.7.0-1-octeon-di
  • loop-modules-5.7.0-1-parisc-di
  • loop-modules-5.7.0-1-parisc64-di
  • loop-modules-5.7.0-1-powerpc-di
  • loop-modules-5.7.0-1-powerpc64-di
  • loop-modules-5.7.0-1-powerpc64le-di
  • loop-modules-5.7.0-1-riscv64-di
  • loop-modules-5.7.0-1-s390x-di
  • loop-modules-5.7.0-1-sh7751r-di
  • loop-modules-5.7.0-1-sh7785lcr-di
  • md-modules-5.7.0-1-4kc-malta-di
  • md-modules-5.7.0-1-5kc-malta-di
  • md-modules-5.7.0-1-686-di
  • md-modules-5.7.0-1-686-pae-di
  • md-modules-5.7.0-1-alpha-generic-di
  • md-modules-5.7.0-1-amd64-di
  • md-modules-5.7.0-1-arm64-di
  • md-modules-5.7.0-1-armmp-di
  • md-modules-5.7.0-1-itanium-di
  • md-modules-5.7.0-1-loongson-3-di
  • md-modules-5.7.0-1-m68k-di
  • md-modules-5.7.0-1-marvell-di
  • md-modules-5.7.0-1-mips32r6-di
  • md-modules-5.7.0-1-mips32r6el-di
  • md-modules-5.7.0-1-mips64r6-di
  • md-modules-5.7.0-1-mips64r6el-di
  • md-modules-5.7.0-1-octeon-di
  • md-modules-5.7.0-1-parisc-di
  • md-modules-5.7.0-1-parisc64-di
  • md-modules-5.7.0-1-powerpc-di
  • md-modules-5.7.0-1-powerpc64-di
  • md-modules-5.7.0-1-powerpc64le-di
  • md-modules-5.7.0-1-riscv64-di
  • md-modules-5.7.0-1-s390x-di
  • md-modules-5.7.0-1-sh7751r-di
  • md-modules-5.7.0-1-sh7785lcr-di
  • md-modules-5.7.0-1-sparc64-di
  • minix-modules-5.7.0-1-4kc-malta-di
  • minix-modules-5.7.0-1-5kc-malta-di
  • minix-modules-5.7.0-1-loongson-3-di
  • minix-modules-5.7.0-1-marvell-di
  • minix-modules-5.7.0-1-octeon-di
  • minix-modules-5.7.0-1-sh7751r-di
  • minix-modules-5.7.0-1-sh7785lcr-di
  • mmc-core-modules-5.7.0-1-4kc-malta-di
  • mmc-core-modules-5.7.0-1-5kc-malta-di
  • mmc-core-modules-5.7.0-1-686-di
  • mmc-core-modules-5.7.0-1-686-pae-di
  • mmc-core-modules-5.7.0-1-amd64-di
  • mmc-core-modules-5.7.0-1-marvell-di
  • mmc-core-modules-5.7.0-1-powerpc-di
  • mmc-core-modules-5.7.0-1-powerpc64-di
  • mmc-core-modules-5.7.0-1-riscv64-di
  • mmc-modules-5.7.0-1-4kc-malta-di
  • mmc-modules-5.7.0-1-5kc-malta-di
  • mmc-modules-5.7.0-1-686-di
  • mmc-modules-5.7.0-1-686-pae-di
  • mmc-modules-5.7.0-1-amd64-di
  • mmc-modules-5.7.0-1-arm64-di
  • mmc-modules-5.7.0-1-armmp-di
  • mmc-modules-5.7.0-1-marvell-di
  • mmc-modules-5.7.0-1-riscv64-di
  • mouse-modules-5.7.0-1-4kc-malta-di
  • mouse-modules-5.7.0-1-5kc-malta-di
  • mouse-modules-5.7.0-1-686-di
  • mouse-modules-5.7.0-1-686-pae-di
  • mouse-modules-5.7.0-1-alpha-generic-di
  • mouse-modules-5.7.0-1-amd64-di
  • mouse-modules-5.7.0-1-itanium-di
  • mouse-modules-5.7.0-1-marvell-di
  • mouse-modules-5.7.0-1-parisc-di
  • mouse-modules-5.7.0-1-parisc64-di
  • mouse-modules-5.7.0-1-powerpc-di
  • mouse-modules-5.7.0-1-powerpc64-di
  • mouse-modules-5.7.0-1-powerpc64le-di
  • mtd-core-modules-5.7.0-1-4kc-malta-di
  • mtd-core-modules-5.7.0-1-5kc-malta-di
  • mtd-core-modules-5.7.0-1-686-di
  • mtd-core-modules-5.7.0-1-686-pae-di
  • mtd-core-modules-5.7.0-1-amd64-di
  • mtd-core-modules-5.7.0-1-arm64-di
  • mtd-core-modules-5.7.0-1-itanium-di
  • mtd-core-modules-5.7.0-1-loongson-3-di
  • mtd-core-modules-5.7.0-1-marvell-di
  • mtd-core-modules-5.7.0-1-powerpc64-di
  • mtd-core-modules-5.7.0-1-powerpc64le-di
  • mtd-core-modules-5.7.0-1-riscv64-di
  • mtd-core-modules-5.7.0-1-s390x-di
  • mtd-modules-5.7.0-1-armmp-di
  • mtd-modules-5.7.0-1-marvell-di
  • mtd-modules-5.7.0-1-riscv64-di
  • multipath-modules-5.7.0-1-4kc-malta-di
  • multipath-modules-5.7.0-1-5kc-malta-di
  • multipath-modules-5.7.0-1-686-di
  • multipath-modules-5.7.0-1-686-pae-di
  • multipath-modules-5.7.0-1-alpha-generic-di
  • multipath-modules-5.7.0-1-amd64-di
  • multipath-modules-5.7.0-1-arm64-di
  • multipath-modules-5.7.0-1-armmp-di
  • multipath-modules-5.7.0-1-itanium-di
  • multipath-modules-5.7.0-1-loongson-3-di
  • multipath-modules-5.7.0-1-marvell-di
  • multipath-modules-5.7.0-1-mips32r6-di
  • multipath-modules-5.7.0-1-mips32r6el-di
  • multipath-modules-5.7.0-1-mips64r6-di
  • multipath-modules-5.7.0-1-mips64r6el-di
  • multipath-modules-5.7.0-1-octeon-di
  • multipath-modules-5.7.0-1-parisc-di
  • multipath-modules-5.7.0-1-parisc64-di
  • multipath-modules-5.7.0-1-powerpc-di
  • multipath-modules-5.7.0-1-powerpc64-di
  • multipath-modules-5.7.0-1-powerpc64le-di
  • multipath-modules-5.7.0-1-riscv64-di
  • multipath-modules-5.7.0-1-s390x-di
  • multipath-modules-5.7.0-1-sh7751r-di
  • multipath-modules-5.7.0-1-sh7785lcr-di
  • multipath-modules-5.7.0-1-sparc64-di
  • nbd-modules-5.7.0-1-4kc-malta-di
  • nbd-modules-5.7.0-1-5kc-malta-di
  • nbd-modules-5.7.0-1-686-di
  • nbd-modules-5.7.0-1-686-pae-di
  • nbd-modules-5.7.0-1-alpha-generic-di
  • nbd-modules-5.7.0-1-amd64-di
  • nbd-modules-5.7.0-1-arm64-di
  • nbd-modules-5.7.0-1-armmp-di
  • nbd-modules-5.7.0-1-itanium-di
  • nbd-modules-5.7.0-1-loongson-3-di
  • nbd-modules-5.7.0-1-m68k-di
  • nbd-modules-5.7.0-1-marvell-di
  • nbd-modules-5.7.0-1-mips32r6-di
  • nbd-modules-5.7.0-1-mips32r6el-di
  • nbd-modules-5.7.0-1-mips64r6-di
  • nbd-modules-5.7.0-1-mips64r6el-di
  • nbd-modules-5.7.0-1-octeon-di
  • nbd-modules-5.7.0-1-parisc-di
  • nbd-modules-5.7.0-1-parisc64-di
  • nbd-modules-5.7.0-1-powerpc-di
  • nbd-modules-5.7.0-1-powerpc64-di
  • nbd-modules-5.7.0-1-powerpc64le-di
  • nbd-modules-5.7.0-1-riscv64-di
  • nbd-modules-5.7.0-1-s390x-di
  • nbd-modules-5.7.0-1-sh7751r-di
  • nbd-modules-5.7.0-1-sh7785lcr-di
  • nbd-modules-5.7.0-1-sparc64-di
  • nfs-modules-5.7.0-1-loongson-3-di
  • nic-modules-5.7.0-1-4kc-malta-di
  • nic-modules-5.7.0-1-5kc-malta-di
  • nic-modules-5.7.0-1-686-di
  • nic-modules-5.7.0-1-686-pae-di
  • nic-modules-5.7.0-1-alpha-generic-di
  • nic-modules-5.7.0-1-amd64-di
  • nic-modules-5.7.0-1-arm64-di
  • nic-modules-5.7.0-1-armmp-di
  • nic-modules-5.7.0-1-itanium-di
  • nic-modules-5.7.0-1-loongson-3-di
  • nic-modules-5.7.0-1-m68k-di
  • nic-modules-5.7.0-1-marvell-di
  • nic-modules-5.7.0-1-octeon-di
  • nic-modules-5.7.0-1-parisc-di
  • nic-modules-5.7.0-1-parisc64-di
  • nic-modules-5.7.0-1-powerpc-di
  • nic-modules-5.7.0-1-powerpc64-di
  • nic-modules-5.7.0-1-powerpc64le-di
  • nic-modules-5.7.0-1-riscv64-di
  • nic-modules-5.7.0-1-s390x-di
  • nic-modules-5.7.0-1-sh7751r-di
  • nic-modules-5.7.0-1-sh7785lcr-di
  • nic-modules-5.7.0-1-sparc64-di
  • nic-pcmcia-modules-5.7.0-1-686-di
  • nic-pcmcia-modules-5.7.0-1-686-pae-di
  • nic-pcmcia-modules-5.7.0-1-alpha-generic-di
  • nic-pcmcia-modules-5.7.0-1-amd64-di
  • nic-pcmcia-modules-5.7.0-1-powerpc-di
  • nic-pcmcia-modules-5.7.0-1-powerpc64-di
  • nic-shared-modules-5.7.0-1-4kc-malta-di
  • nic-shared-modules-5.7.0-1-5kc-malta-di
  • nic-shared-modules-5.7.0-1-686-di
  • nic-shared-modules-5.7.0-1-686-pae-di
  • nic-shared-modules-5.7.0-1-alpha-generic-di
  • nic-shared-modules-5.7.0-1-amd64-di
  • nic-shared-modules-5.7.0-1-arm64-di
  • nic-shared-modules-5.7.0-1-armmp-di
  • nic-shared-modules-5.7.0-1-itanium-di
  • nic-shared-modules-5.7.0-1-loongson-3-di
  • nic-shared-modules-5.7.0-1-m68k-di
  • nic-shared-modules-5.7.0-1-marvell-di
  • nic-shared-modules-5.7.0-1-mips32r6-di
  • nic-shared-modules-5.7.0-1-mips32r6el-di
  • nic-shared-modules-5.7.0-1-mips64r6-di
  • nic-shared-modules-5.7.0-1-mips64r6el-di
  • nic-shared-modules-5.7.0-1-octeon-di
  • nic-shared-modules-5.7.0-1-parisc-di
  • nic-shared-modules-5.7.0-1-parisc64-di
  • nic-shared-modules-5.7.0-1-powerpc-di
  • nic-shared-modules-5.7.0-1-powerpc64-di
  • nic-shared-modules-5.7.0-1-powerpc64le-di
  • nic-shared-modules-5.7.0-1-riscv64-di
  • nic-shared-modules-5.7.0-1-sh7751r-di
  • nic-shared-modules-5.7.0-1-sh7785lcr-di
  • nic-shared-modules-5.7.0-1-sparc64-di
  • nic-usb-modules-5.7.0-1-4kc-malta-di
  • nic-usb-modules-5.7.0-1-5kc-malta-di
  • nic-usb-modules-5.7.0-1-686-di
  • nic-usb-modules-5.7.0-1-686-pae-di
  • nic-usb-modules-5.7.0-1-alpha-generic-di
  • nic-usb-modules-5.7.0-1-amd64-di
  • nic-usb-modules-5.7.0-1-arm64-di
  • nic-usb-modules-5.7.0-1-armmp-di
  • nic-usb-modules-5.7.0-1-itanium-di
  • nic-usb-modules-5.7.0-1-loongson-3-di
  • nic-usb-modules-5.7.0-1-marvell-di
  • nic-usb-modules-5.7.0-1-octeon-di
  • nic-usb-modules-5.7.0-1-parisc-di
  • nic-usb-modules-5.7.0-1-parisc64-di
  • nic-usb-modules-5.7.0-1-powerpc-di
  • nic-usb-modules-5.7.0-1-powerpc64-di
  • nic-usb-modules-5.7.0-1-powerpc64le-di
  • nic-usb-modules-5.7.0-1-riscv64-di
  • nic-usb-modules-5.7.0-1-sh7751r-di
  • nic-usb-modules-5.7.0-1-sh7785lcr-di
  • nic-usb-modules-5.7.0-1-sparc64-di
  • nic-wireless-modules-5.7.0-1-4kc-malta-di
  • nic-wireless-modules-5.7.0-1-5kc-malta-di
  • nic-wireless-modules-5.7.0-1-686-di
  • nic-wireless-modules-5.7.0-1-686-pae-di
  • nic-wireless-modules-5.7.0-1-alpha-generic-di
  • nic-wireless-modules-5.7.0-1-amd64-di
  • nic-wireless-modules-5.7.0-1-arm64-di
  • nic-wireless-modules-5.7.0-1-armmp-di
  • nic-wireless-modules-5.7.0-1-loongson-3-di
  • nic-wireless-modules-5.7.0-1-octeon-di
  • nic-wireless-modules-5.7.0-1-powerpc-di
  • nic-wireless-modules-5.7.0-1-powerpc64-di
  • nic-wireless-modules-5.7.0-1-powerpc64le-di
  • nic-wireless-modules-5.7.0-1-riscv64-di
  • pata-modules-5.7.0-1-4kc-malta-di
  • pata-modules-5.7.0-1-5kc-malta-di
  • pata-modules-5.7.0-1-686-di
  • pata-modules-5.7.0-1-686-pae-di
  • pata-modules-5.7.0-1-alpha-generic-di
  • pata-modules-5.7.0-1-amd64-di
  • pata-modules-5.7.0-1-armmp-di
  • pata-modules-5.7.0-1-itanium-di
  • pata-modules-5.7.0-1-loongson-3-di
  • pata-modules-5.7.0-1-m68k-di
  • pata-modules-5.7.0-1-octeon-di
  • pata-modules-5.7.0-1-parisc-di
  • pata-modules-5.7.0-1-parisc64-di
  • pata-modules-5.7.0-1-powerpc-di
  • pata-modules-5.7.0-1-powerpc64-di
  • pata-modules-5.7.0-1-riscv64-di
  • pata-modules-5.7.0-1-sh7751r-di
  • pata-modules-5.7.0-1-sh7785lcr-di
  • pata-modules-5.7.0-1-sparc64-di
  • pcmcia-modules-5.7.0-1-686-di
  • pcmcia-modules-5.7.0-1-686-pae-di
  • pcmcia-modules-5.7.0-1-alpha-generic-di
  • pcmcia-modules-5.7.0-1-amd64-di
  • pcmcia-modules-5.7.0-1-itanium-di
  • pcmcia-modules-5.7.0-1-powerpc-di
  • pcmcia-modules-5.7.0-1-powerpc64-di
  • pcmcia-storage-modules-5.7.0-1-686-di
  • pcmcia-storage-modules-5.7.0-1-686-pae-di
  • pcmcia-storage-modules-5.7.0-1-amd64-di
  • pcmcia-storage-modules-5.7.0-1-powerpc-di
  • pcmcia-storage-modules-5.7.0-1-powerpc64-di
  • ppp-modules-5.7.0-1-4kc-malta-di
  • ppp-modules-5.7.0-1-5kc-malta-di
  • ppp-modules-5.7.0-1-686-di
  • ppp-modules-5.7.0-1-686-pae-di
  • ppp-modules-5.7.0-1-alpha-generic-di
  • ppp-modules-5.7.0-1-amd64-di
  • ppp-modules-5.7.0-1-arm64-di
  • ppp-modules-5.7.0-1-armmp-di
  • ppp-modules-5.7.0-1-itanium-di
  • ppp-modules-5.7.0-1-loongson-3-di
  • ppp-modules-5.7.0-1-m68k-di
  • ppp-modules-5.7.0-1-marvell-di
  • ppp-modules-5.7.0-1-octeon-di
  • ppp-modules-5.7.0-1-parisc-di
  • ppp-modules-5.7.0-1-parisc64-di
  • ppp-modules-5.7.0-1-powerpc-di
  • ppp-modules-5.7.0-1-powerpc64-di
  • ppp-modules-5.7.0-1-powerpc64le-di
  • ppp-modules-5.7.0-1-riscv64-di
  • ppp-modules-5.7.0-1-sh7751r-di
  • ppp-modules-5.7.0-1-sh7785lcr-di
  • ppp-modules-5.7.0-1-sparc64-di
  • rfkill-modules-5.7.0-1-686-di
  • rfkill-modules-5.7.0-1-686-pae-di
  • rfkill-modules-5.7.0-1-amd64-di
  • rtc-modules-5.7.0-1-octeon-di
  • sata-modules-5.7.0-1-4kc-malta-di
  • sata-modules-5.7.0-1-5kc-malta-di
  • sata-modules-5.7.0-1-686-di
  • sata-modules-5.7.0-1-686-pae-di
  • sata-modules-5.7.0-1-alpha-generic-di
  • sata-modules-5.7.0-1-amd64-di
  • sata-modules-5.7.0-1-arm64-di
  • sata-modules-5.7.0-1-armmp-di
  • sata-modules-5.7.0-1-itanium-di
  • sata-modules-5.7.0-1-loongson-3-di
  • sata-modules-5.7.0-1-marvell-di
  • sata-modules-5.7.0-1-octeon-di
  • sata-modules-5.7.0-1-parisc-di
  • sata-modules-5.7.0-1-parisc64-di
  • sata-modules-5.7.0-1-powerpc-di
  • sata-modules-5.7.0-1-powerpc64-di
  • sata-modules-5.7.0-1-powerpc64le-di
  • sata-modules-5.7.0-1-riscv64-di
  • sata-modules-5.7.0-1-sh7751r-di
  • sata-modules-5.7.0-1-sh7785lcr-di
  • sata-modules-5.7.0-1-sparc64-di
  • scsi-core-modules-5.7.0-1-4kc-malta-di
  • scsi-core-modules-5.7.0-1-5kc-malta-di
  • scsi-core-modules-5.7.0-1-686-di
  • scsi-core-modules-5.7.0-1-686-pae-di
  • scsi-core-modules-5.7.0-1-alpha-generic-di
  • scsi-core-modules-5.7.0-1-amd64-di
  • scsi-core-modules-5.7.0-1-arm64-di
  • scsi-core-modules-5.7.0-1-armmp-di
  • scsi-core-modules-5.7.0-1-itanium-di
  • scsi-core-modules-5.7.0-1-loongson-3-di
  • scsi-core-modules-5.7.0-1-m68k-di
  • scsi-core-modules-5.7.0-1-marvell-di
  • scsi-core-modules-5.7.0-1-octeon-di
  • scsi-core-modules-5.7.0-1-parisc-di
  • scsi-core-modules-5.7.0-1-parisc64-di
  • scsi-core-modules-5.7.0-1-powerpc-di
  • scsi-core-modules-5.7.0-1-powerpc64-di
  • scsi-core-modules-5.7.0-1-powerpc64le-di
  • scsi-core-modules-5.7.0-1-riscv64-di
  • scsi-core-modules-5.7.0-1-s390x-di
  • scsi-core-modules-5.7.0-1-sparc64-di
  • scsi-modules-5.7.0-1-4kc-malta-di
  • scsi-modules-5.7.0-1-5kc-malta-di
  • scsi-modules-5.7.0-1-686-di
  • scsi-modules-5.7.0-1-686-pae-di
  • scsi-modules-5.7.0-1-alpha-generic-di
  • scsi-modules-5.7.0-1-amd64-di
  • scsi-modules-5.7.0-1-arm64-di
  • scsi-modules-5.7.0-1-armmp-di
  • scsi-modules-5.7.0-1-itanium-di
  • scsi-modules-5.7.0-1-loongson-3-di
  • scsi-modules-5.7.0-1-m68k-di
  • scsi-modules-5.7.0-1-octeon-di
  • scsi-modules-5.7.0-1-parisc-di
  • scsi-modules-5.7.0-1-parisc64-di
  • scsi-modules-5.7.0-1-powerpc-di
  • scsi-modules-5.7.0-1-powerpc64-di
  • scsi-modules-5.7.0-1-powerpc64le-di
  • scsi-modules-5.7.0-1-riscv64-di
  • scsi-modules-5.7.0-1-s390x-di
  • scsi-modules-5.7.0-1-sparc64-di
  • scsi-nic-modules-5.7.0-1-4kc-malta-di
  • scsi-nic-modules-5.7.0-1-5kc-malta-di
  • scsi-nic-modules-5.7.0-1-686-di
  • scsi-nic-modules-5.7.0-1-686-pae-di
  • scsi-nic-modules-5.7.0-1-alpha-generic-di
  • scsi-nic-modules-5.7.0-1-amd64-di
  • scsi-nic-modules-5.7.0-1-arm64-di
  • scsi-nic-modules-5.7.0-1-armmp-di
  • scsi-nic-modules-5.7.0-1-itanium-di
  • scsi-nic-modules-5.7.0-1-loongson-3-di
  • scsi-nic-modules-5.7.0-1-octeon-di
  • scsi-nic-modules-5.7.0-1-powerpc-di
  • scsi-nic-modules-5.7.0-1-powerpc64-di
  • scsi-nic-modules-5.7.0-1-powerpc64le-di
  • scsi-nic-modules-5.7.0-1-riscv64-di
  • serial-modules-5.7.0-1-686-di
  • serial-modules-5.7.0-1-686-pae-di
  • serial-modules-5.7.0-1-alpha-generic-di
  • serial-modules-5.7.0-1-amd64-di
  • serial-modules-5.7.0-1-itanium-di
  • serial-modules-5.7.0-1-parisc-di
  • serial-modules-5.7.0-1-parisc64-di
  • serial-modules-5.7.0-1-powerpc-di
  • serial-modules-5.7.0-1-powerpc64-di
  • serial-modules-5.7.0-1-powerpc64le-di
  • sound-modules-5.7.0-1-4kc-malta-di
  • sound-modules-5.7.0-1-5kc-malta-di
  • sound-modules-5.7.0-1-686-di
  • sound-modules-5.7.0-1-686-pae-di
  • sound-modules-5.7.0-1-amd64-di
  • sound-modules-5.7.0-1-loongson-3-di
  • sound-modules-5.7.0-1-octeon-di
  • sound-modules-5.7.0-1-sh7751r-di
  • sound-modules-5.7.0-1-sh7785lcr-di
  • speakup-modules-5.7.0-1-686-di
  • speakup-modules-5.7.0-1-686-pae-di
  • speakup-modules-5.7.0-1-amd64-di
  • speakup-modules-5.7.0-1-loongson-3-di
  • speakup-modules-5.7.0-1-sh7751r-di
  • speakup-modules-5.7.0-1-sh7785lcr-di
  • squashfs-modules-5.7.0-1-4kc-malta-di
  • squashfs-modules-5.7.0-1-5kc-malta-di
  • squashfs-modules-5.7.0-1-686-di
  • squashfs-modules-5.7.0-1-686-pae-di
  • squashfs-modules-5.7.0-1-alpha-generic-di
  • squashfs-modules-5.7.0-1-amd64-di
  • squashfs-modules-5.7.0-1-arm64-di
  • squashfs-modules-5.7.0-1-armmp-di
  • squashfs-modules-5.7.0-1-itanium-di
  • squashfs-modules-5.7.0-1-loongson-3-di
  • squashfs-modules-5.7.0-1-m68k-di
  • squashfs-modules-5.7.0-1-marvell-di
  • squashfs-modules-5.7.0-1-mips32r6-di
  • squashfs-modules-5.7.0-1-mips32r6el-di
  • squashfs-modules-5.7.0-1-mips64r6-di
  • squashfs-modules-5.7.0-1-mips64r6el-di
  • squashfs-modules-5.7.0-1-octeon-di
  • squashfs-modules-5.7.0-1-parisc-di
  • squashfs-modules-5.7.0-1-parisc64-di
  • squashfs-modules-5.7.0-1-powerpc-di
  • squashfs-modules-5.7.0-1-powerpc64-di
  • squashfs-modules-5.7.0-1-powerpc64le-di
  • squashfs-modules-5.7.0-1-riscv64-di
  • squashfs-modules-5.7.0-1-sh7751r-di
  • squashfs-modules-5.7.0-1-sh7785lcr-di
  • squashfs-modules-5.7.0-1-sparc64-di
  • srm-modules-5.7.0-1-alpha-generic-di
  • udf-modules-5.7.0-1-4kc-malta-di
  • udf-modules-5.7.0-1-5kc-malta-di
  • udf-modules-5.7.0-1-686-di
  • udf-modules-5.7.0-1-686-pae-di
  • udf-modules-5.7.0-1-amd64-di
  • udf-modules-5.7.0-1-arm64-di
  • udf-modules-5.7.0-1-armmp-di
  • udf-modules-5.7.0-1-itanium-di
  • udf-modules-5.7.0-1-loongson-3-di
  • udf-modules-5.7.0-1-m68k-di
  • udf-modules-5.7.0-1-marvell-di
  • udf-modules-5.7.0-1-mips32r6-di
  • udf-modules-5.7.0-1-mips32r6el-di
  • udf-modules-5.7.0-1-mips64r6-di
  • udf-modules-5.7.0-1-mips64r6el-di
  • udf-modules-5.7.0-1-octeon-di
  • udf-modules-5.7.0-1-powerpc-di
  • udf-modules-5.7.0-1-powerpc64-di
  • udf-modules-5.7.0-1-powerpc64le-di
  • udf-modules-5.7.0-1-riscv64-di
  • udf-modules-5.7.0-1-s390x-di
  • udf-modules-5.7.0-1-sh7751r-di
  • udf-modules-5.7.0-1-sh7785lcr-di
  • udf-modules-5.7.0-1-sparc64-di
  • ufs-modules-5.7.0-1-sparc64-di
  • uinput-modules-5.7.0-1-686-di
  • uinput-modules-5.7.0-1-686-pae-di
  • uinput-modules-5.7.0-1-amd64-di
  • uinput-modules-5.7.0-1-arm64-di
  • uinput-modules-5.7.0-1-armmp-di
  • uinput-modules-5.7.0-1-itanium-di
  • uinput-modules-5.7.0-1-marvell-di
  • uinput-modules-5.7.0-1-powerpc-di
  • uinput-modules-5.7.0-1-powerpc64-di
  • uinput-modules-5.7.0-1-powerpc64le-di
  • usb-modules-5.7.0-1-4kc-malta-di
  • usb-modules-5.7.0-1-5kc-malta-di
  • usb-modules-5.7.0-1-686-di
  • usb-modules-5.7.0-1-686-pae-di
  • usb-modules-5.7.0-1-alpha-generic-di
  • usb-modules-5.7.0-1-amd64-di
  • usb-modules-5.7.0-1-arm64-di
  • usb-modules-5.7.0-1-armmp-di
  • usb-modules-5.7.0-1-itanium-di
  • usb-modules-5.7.0-1-loongson-3-di
  • usb-modules-5.7.0-1-marvell-di
  • usb-modules-5.7.0-1-octeon-di
  • usb-modules-5.7.0-1-parisc-di
  • usb-modules-5.7.0-1-parisc64-di
  • usb-modules-5.7.0-1-powerpc-di
  • usb-modules-5.7.0-1-powerpc64-di
  • usb-modules-5.7.0-1-powerpc64le-di
  • usb-modules-5.7.0-1-riscv64-di
  • usb-modules-5.7.0-1-sparc64-di
  • usb-serial-modules-5.7.0-1-4kc-malta-di
  • usb-serial-modules-5.7.0-1-5kc-malta-di
  • usb-serial-modules-5.7.0-1-686-di
  • usb-serial-modules-5.7.0-1-686-pae-di
  • usb-serial-modules-5.7.0-1-alpha-generic-di
  • usb-serial-modules-5.7.0-1-amd64-di
  • usb-serial-modules-5.7.0-1-arm64-di
  • usb-serial-modules-5.7.0-1-armmp-di
  • usb-serial-modules-5.7.0-1-itanium-di
  • usb-serial-modules-5.7.0-1-loongson-3-di
  • usb-serial-modules-5.7.0-1-marvell-di
  • usb-serial-modules-5.7.0-1-octeon-di
  • usb-serial-modules-5.7.0-1-parisc-di
  • usb-serial-modules-5.7.0-1-parisc64-di
  • usb-serial-modules-5.7.0-1-powerpc-di
  • usb-serial-modules-5.7.0-1-powerpc64-di
  • usb-serial-modules-5.7.0-1-powerpc64le-di
  • usb-serial-modules-5.7.0-1-riscv64-di
  • usb-serial-modules-5.7.0-1-sh7751r-di
  • usb-serial-modules-5.7.0-1-sh7785lcr-di
  • usb-serial-modules-5.7.0-1-sparc64-di
  • usb-storage-modules-5.7.0-1-4kc-malta-di
  • usb-storage-modules-5.7.0-1-5kc-malta-di
  • usb-storage-modules-5.7.0-1-686-di
  • usb-storage-modules-5.7.0-1-686-pae-di
  • usb-storage-modules-5.7.0-1-alpha-generic-di
  • usb-storage-modules-5.7.0-1-amd64-di
  • usb-storage-modules-5.7.0-1-arm64-di
  • usb-storage-modules-5.7.0-1-armmp-di
  • usb-storage-modules-5.7.0-1-itanium-di
  • usb-storage-modules-5.7.0-1-loongson-3-di
  • usb-storage-modules-5.7.0-1-marvell-di
  • usb-storage-modules-5.7.0-1-octeon-di
  • usb-storage-modules-5.7.0-1-parisc-di
  • usb-storage-modules-5.7.0-1-parisc64-di
  • usb-storage-modules-5.7.0-1-powerpc-di
  • usb-storage-modules-5.7.0-1-powerpc64-di
  • usb-storage-modules-5.7.0-1-powerpc64le-di
  • usb-storage-modules-5.7.0-1-riscv64-di
  • usb-storage-modules-5.7.0-1-sh7751r-di
  • usb-storage-modules-5.7.0-1-sparc64-di
  • usbip (4 bugs: 0, 4, 0, 0)
  • xfs-modules-5.7.0-1-4kc-malta-di
  • xfs-modules-5.7.0-1-5kc-malta-di
  • xfs-modules-5.7.0-1-686-di
  • xfs-modules-5.7.0-1-686-pae-di
  • xfs-modules-5.7.0-1-alpha-generic-di
  • xfs-modules-5.7.0-1-amd64-di
  • xfs-modules-5.7.0-1-arm64-di
  • xfs-modules-5.7.0-1-itanium-di
  • xfs-modules-5.7.0-1-loongson-3-di
  • xfs-modules-5.7.0-1-mips32r6-di
  • xfs-modules-5.7.0-1-mips32r6el-di
  • xfs-modules-5.7.0-1-mips64r6-di
  • xfs-modules-5.7.0-1-mips64r6el-di
  • xfs-modules-5.7.0-1-octeon-di
  • xfs-modules-5.7.0-1-parisc-di
  • xfs-modules-5.7.0-1-parisc64-di
  • xfs-modules-5.7.0-1-powerpc-di
  • xfs-modules-5.7.0-1-powerpc64-di
  • xfs-modules-5.7.0-1-powerpc64le-di
  • xfs-modules-5.7.0-1-s390x-di
  • xfs-modules-5.7.0-1-sh7751r-di
  • xfs-modules-5.7.0-1-sh7785lcr-di
  • xfs-modules-5.7.0-1-sparc64-di
action needed
A new upstream version is available: 5.7.10 high
A new upstream version 5.7.10 is available, you should consider packaging it.
Created: 2020-07-03 Last update: 2020-07-23 22:33
45 security issues in buster high
There are 45 open security issues in buster.
42 important issues:
  • CVE-2019-19770: ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
  • CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
  • CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
  • CVE-2019-15794: Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
  • CVE-2019-19318: In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,
  • CVE-2018-3693: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
  • CVE-2020-11725: ** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.
  • CVE-2019-19448: In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
  • CVE-2019-19449: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
  • CVE-2020-15393: In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
  • CVE-2019-18885: fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15.
  • CVE-2019-20794: An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
  • CVE-2018-17977: The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7.
  • CVE-2017-0630: An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
  • CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
  • CVE-2019-19813: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
  • CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
  • CVE-2020-12888: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
  • CVE-2018-18653: The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.
  • CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
  • CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
  • CVE-2019-19072: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
  • CVE-2020-14304:
  • CVE-2019-19815: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
  • CVE-2019-19814: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
  • CVE-2020-12771: An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
  • CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
  • CVE-2020-10766:
  • CVE-2020-10768:
  • CVE-2020-10781:
  • CVE-2020-14314:
  • CVE-2019-15213: An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.
  • CVE-2020-10767:
  • CVE-2019-19039: ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.”
  • CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
  • CVE-2019-16089: An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.
  • CVE-2020-13974: ** DISPUTED ** An issue was discovered in the Linux kernel through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
  • CVE-2019-18814: An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.
  • CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
  • CVE-2019-12881: i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafted ioctl calls to /dev/dri/card0.
  • CVE-2019-19378: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
  • CVE-2019-19377: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.
3 issues skipped by the security teams:
  • CVE-2018-12928: In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
  • CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
  • CVE-2013-7445: The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.
Please fix them.
Created: 2017-06-18 Last update: 2020-07-22 05:34
28 security issues in bullseye high
There are 28 open security issues in bullseye.
28 important issues:
  • CVE-2019-19770: ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
  • CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
  • CVE-2019-15794: Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
  • CVE-2018-3693: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
  • CVE-2020-11725: ** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.
  • CVE-2018-12928: In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
  • CVE-2019-19448: In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
  • CVE-2019-19449: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
  • CVE-2020-15393: In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
  • CVE-2020-15852: An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
  • CVE-2019-20794: An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
  • CVE-2018-17977: The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7.
  • CVE-2017-0630: An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
  • CVE-2019-19813: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
  • CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
  • CVE-2020-12888: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
  • CVE-2018-18653: The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.
  • CVE-2020-14304:
  • CVE-2019-19814: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
  • CVE-2013-7445: The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.
  • CVE-2020-10781:
  • CVE-2020-14314:
  • CVE-2019-15213: An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.
  • CVE-2019-19039: ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.”
  • CVE-2019-16089: An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.
  • CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
  • CVE-2019-12881: i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafted ioctl calls to /dev/dri/card0.
  • CVE-2019-19378: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
Please fix them.
Created: 2019-07-07 Last update: 2020-07-22 05:34
28 security issues in sid high
There are 28 open security issues in sid.
28 important issues:
  • CVE-2019-19770: ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
  • CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
  • CVE-2019-15794: Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
  • CVE-2018-3693: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
  • CVE-2020-11725: ** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.
  • CVE-2018-12928: In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
  • CVE-2019-19448: In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
  • CVE-2019-19449: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
  • CVE-2020-15393: In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
  • CVE-2020-15852: An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
  • CVE-2019-20794: An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
  • CVE-2018-17977: The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7.
  • CVE-2017-0630: An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
  • CVE-2019-19813: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
  • CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
  • CVE-2020-12888: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
  • CVE-2018-18653: The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.
  • CVE-2020-14304:
  • CVE-2019-19814: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
  • CVE-2013-7445: The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.
  • CVE-2020-10781:
  • CVE-2020-14314:
  • CVE-2019-15213: An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.
  • CVE-2019-19039: ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.”
  • CVE-2019-16089: An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.
  • CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
  • CVE-2019-12881: i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafted ioctl calls to /dev/dri/card0.
  • CVE-2019-19378: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
Please fix them.
Created: 2015-07-12 Last update: 2020-07-22 05:34
51 security issues in stretch high
There are 51 open security issues in stretch.
42 important issues:
  • CVE-2018-13095: An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
  • CVE-2019-19770: ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
  • CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
  • CVE-2019-19318: In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,
  • CVE-2018-12930: ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
  • CVE-2018-12931: ntfs_attr_find in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
  • CVE-2018-3693: Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
  • CVE-2020-11725: ** DISPUTED ** snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line, which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding, because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers, SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE, have been designed to misuse the info->owner field in a safe way.
  • CVE-2018-12929: ntfs_read_locked_inode in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a use-after-free read and possibly cause a denial of service (kernel oops or panic) via a crafted ntfs filesystem.
  • CVE-2019-19448: In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
  • CVE-2019-19449: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
  • CVE-2019-9445: In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
  • CVE-2020-14305:
  • CVE-2020-15393: In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
  • CVE-2019-20794: An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
  • CVE-2018-17977: The Linux kernel 4.14.67 mishandles certain interaction among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets, which allows local users to cause a denial of service (memory consumption and system hang) by leveraging root access to execute crafted applications, as demonstrated on CentOS 7.
  • CVE-2017-0630: An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
  • CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
  • CVE-2019-19813: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in __mutex_lock in kernel/locking/mutex.c. This is related to mutex_can_spin_on_owner in kernel/locking/mutex.c, __btrfs_qgroup_free_meta in fs/btrfs/qgroup.c, and btrfs_insert_delayed_items in fs/btrfs/delayed-inode.c.
  • CVE-2019-19816: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image and performing some operations can cause slab-out-of-bounds write access in __btrfs_map_block in fs/btrfs/volumes.c, because a value of 1 for the number of data stripes is mishandled.
  • CVE-2020-12888: The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
  • CVE-2020-0030: In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Upstream kernel
  • CVE-2018-18653: The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.
  • CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
  • CVE-2019-19073: Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
  • CVE-2020-14304:
  • CVE-2019-19815: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
  • CVE-2019-19814: In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
  • CVE-2020-12771: An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
  • CVE-2020-14314:
  • CVE-2019-19039: ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.”
  • CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
  • CVE-2020-0067: In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
  • CVE-2019-9453: In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
  • CVE-2019-19036: btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
  • CVE-2019-12881: i915_gem_userptr_get_pages in drivers/gpu/drm/i915/i915_gem_userptr.c in the Linux kernel 4.15.0 on Ubuntu 18.04.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact via crafted ioctl calls to /dev/dri/card0.
  • CVE-2018-10322: The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
  • CVE-2019-2213: In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel
  • CVE-2019-9245: In the Android kernel in the f2fs driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
  • CVE-2019-12984: A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
  • CVE-2019-19378: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
  • CVE-2019-19377: In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.
9 issues skipped by the security teams:
  • CVE-2018-1108: kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
  • CVE-2017-18232: The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code.
  • CVE-2018-12928: In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
  • CVE-2019-9444: In the Android kernel in sync debug fs driver there is a kernel pointer leak due to the usage of printf with %p. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
  • CVE-2018-7273: In the Linux kernel through 4.15.4, the floppy driver reveals the addresses of kernel functions and global variables using printk calls within the function show_floppy in drivers/block/floppy.c. An attacker can read this information from dmesg and use the addresses to find the locations of kernel code and data and bypass kernel security protections such as KASLR.
  • CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
  • CVE-2018-7754: The aoedisk_debugfs_show function in drivers/block/aoe/aoeblk.c in the Linux kernel through 4.16.4rc4 allows local users to obtain sensitive address information by reading "ffree: " lines in a debugfs file.
  • CVE-2013-7445: The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated by JavaScript code that creates many CANVAS elements for rendering by Chrome or Firefox.
  • CVE-2018-20449: The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file.
Please fix them.
Created: 2015-07-12 Last update: 2020-07-22 05:34
88 bugs tagged patch in the BTS normal
The BTS contains patches fixing 88 bugs (91 if counting merged bugs), consider including or untagging them.
Created: 2020-06-28 Last update: 2020-07-24 02:31
Depends on packages which need a new maintainer normal
The packages that linux depends on which need a new maintainer are:
  • dh-exec (#851746)
    • Build-Depends: dh-exec
Created: 2019-11-22 Last update: 2020-07-24 00:32
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • libcpupower-dev could be marked Multi-Arch: same
  • libcpupower1 could be marked Multi-Arch: same
Created: 2020-06-27 Last update: 2020-07-23 22:36
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2019-12-14 Last update: 2020-07-23 22:35
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 5.8~rc6-1~exp1, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 7f99deaf5bf62297716de4c2007c50a20397cf30
Author: Uwe Kleine-König <uwe@kleine-koenig.org>
Date:   Wed Jul 22 09:05:30 2020 +0200

    [arm64] Enable IR_MESON and SPI_MESON_SPICC

commit becba9933c76b03ac6dad70d3ee41d0cd55d3e55
Merge: f9f84a03807 50fa5b4b2cb
Author: Romain Perier <romain.perier@gmail.com>
Date:   Tue Jul 21 19:44:44 2020 +0000

    Merge branch '5.8.x' into 'master'
    
    Update to 5.8~rc6
    
    See merge request kernel-team/linux!256

commit 50fa5b4b2cbc06e0d43be6933e9e1a0a19d940dc
Author: Romain Perier <romain.perier@opensource.viveris.fr>
Date:   Fri Jul 17 09:38:43 2020 +0200

    Update to 5.8~rc6

commit f9f84a03807c381fc96068041711dc06de9fa9ea
Merge: 2f37075f131 562fc24acd9
Author: Salvatore Bonaccorso <carnil@debian.org>
Date:   Wed Jul 1 19:56:09 2020 +0000

    Merge branch 'apple-mfi-fastcharge' into 'master'
    
    usb: Enable APPLE_MFI_FASTCHARGE as a module
    
    See merge request kernel-team/linux!250

commit 562fc24acd96e43942e6799fae6725cf09d6b6f5
Author: Yves-Alexis Perez <corsac@debian.org>
Date:   Wed Jun 24 22:09:40 2020 +0200

    usb: Enable APPLE_MFI_FASTCHARGE as a module

commit 2f37075f131e01a92ebca8e5e441df40f062813f
Author: Helge Deller <deller@gmx.de>
Date:   Tue Jun 30 13:35:29 2020 +0200

    [hppa] Use same description as former linux-image-parisc*-smp packages

commit bc6c8c68addb15965b1fa578944c1005583fcb41
Author: Helge Deller <deller@gmx.de>
Date:   Tue Jun 30 00:55:41 2020 +0200

    [hppa] Build linux-image-parisc-smp and linux-image-parisc64-smp transition packages
    
    In commit fc6f1855ec7f ("[hppa] Merge parisc SMP- and UP-kernels") we stopped
    building dedicated SMP kernels for parisc, but forgot to provide transition
    packages which allow an automated upgrade to the successor packages
    (linux-image-parisc and linux-image-parisc64).

commit 1b5d7ef24dc61c5bbcf2f0e84ca0be49cce59cf5
Author: Uwe Kleine-König <uwe@kleine-koenig.org>
Date:   Mon Jun 29 22:54:28 2020 +0200

    [armhf] Enable BCM2835 auxiliar mini UART support
Created: 2020-06-29 Last update: 2020-07-23 20:33
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2019-08-22 Last update: 2019-08-22 01:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.0 instead of 4.2.0).
Created: 2017-12-02 Last update: 2020-06-25 19:35
testing migrations
  • This package will soon be part of the auto-perl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2020-07-11] Accepted linux 4.19.131-2 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-07-10] Accepted linux 4.19.131-1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-07-06] Accepted linux 4.9.228-1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-07-01] linux 5.7.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-06-25] Accepted linux 5.7.6-1 (source) into unstable, unstable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-06-22] linux 5.6.14-2 MIGRATED to testing (Debian testing watch)
  • [2020-06-15] Accepted linux 4.19.118-2+deb10u1~bpo9+1 (source) into stretch-backports->backports-policy, stretch-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-06-15] Accepted linux 5.6.14-2~bpo10+1 (source) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-06-10] Accepted linux 4.9.210-1+deb9u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-06-10] Accepted linux 4.19.118-2+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-06-10] Accepted linux 5.6.14-2 (source) into unstable (Ben Hutchings)
  • [2020-06-09] Accepted linux 4.9.210-1+deb9u1 (source) into oldstable->embargoed, oldstable (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-06-09] Accepted linux 4.19.118-2+deb10u1 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-06-09] Accepted linux 3.16.84-1 (all source) into oldoldstable, oldoldstable (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-05-30] linux 5.6.14-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-30] linux 5.6.14-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-27] Accepted linux 4.19.118-2~bpo9+1 (source) into stretch-backports->backports-policy, stretch-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-05-23] Accepted linux 5.6.14-1 (source) into unstable, unstable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-05-12] Accepted linux 5.7~rc5-1~exp1 (source) into experimental, experimental (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-05-05] linux 5.6.7-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-29] Accepted linux 4.19.118-2 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-04-29] Accepted linux 5.6.7-1 (source) into unstable, unstable (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-04-28] Accepted linux 4.19.98-1+deb10u1 (source) into stable->embargoed, stable (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2020-04-27] Accepted linux 5.5.17-1~bpo10+1 (source) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-04-27] Accepted linux 4.19.118-1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-04-23] linux 5.5.17-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-17] Accepted linux 5.6.4-1~exp1 (source) into experimental, experimental (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-04-17] Accepted linux 5.5.17-1 (source) into unstable, unstable (Debian FTP Masters) (signed by: Ben Hutchings)
  • [2020-04-15] linux 5.5.13-2 MIGRATED to testing (Debian testing watch)
  • [2020-03-30] Accepted linux 5.5.13-2 (source) into unstable (Salvatore Bonaccorso)
  • 1
  • 2
bugs [bug history graph]
  • all: 2645 2736
  • RC: 15 16
  • I&N: 2431 2511
  • M&W: 191 200
  • F&P: 8 9
  • patch: 88 91
links
  • homepage
  • buildd: logs, checks, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • security tracker
  • l10n (-, 41)
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.4.0-26.30
  • 7105 bugs (273 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing