mstflint 4.26.0+1-2ubuntu3 source package in Ubuntu

Changelog

mstflint (4.26.0+1-2ubuntu3) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- William Grant <email address hidden>  Mon, 01 Apr 2024 17:58:01 +1100

Upload details

Uploaded by:
William Grant
Uploaded to:
Noble
Original maintainer:
Ubuntu Developers
Architectures:
linux-any all
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe net
Noble release universe net

Downloads

File Size SHA-256 Checksum
mstflint_4.26.0+1.orig.tar.gz 7.1 MiB 7042cb90d52f065734524f10f4fc8ecc890ef14582317e5ddae366ea311e3515
mstflint_4.26.0+1-2ubuntu3.debian.tar.xz 10.4 KiB 840b9f73dd96fa5dd131159c294ecd8713ba01df5b0f575bccd3fefc1efb3616
mstflint_4.26.0+1-2ubuntu3.dsc 2.3 KiB a11d61df5435e1973a96804f3a1d37096ae3d68a1ee23e2c67bb2fa74dfac40d

View changes file

Binary packages built by this source

mstflint: Mellanox firmware burning application and diagnostics tools

 This package contains a burning tool and diagnostic tools for Mellanox
 manufactured host channel adapters (HCA) and network interface cards (NIC).
 .
 This burning tool should be used only with Mellanox-manufactured
 HCA/NIC cards. Using it with cards manufactured by other vendors may
 be harmful to the cards (due to different configurations). Using the
 diagnostic tools is normally safe for all HCAs/NICs.

mstflint-dbgsym: debug symbols for mstflint
mstflint-dkms: mstflint kernel module for Linux

 The mstflint userspace tools require a kernel module to operate in
 Secure Boot mode. This package provides the required module source,
 and will build that module for your kernel upon installation.
 .
 Note: This module will need to be signed by a trusted key in order
 for your kernel to load it when booted in Secure Boot mode.
 For information on how to do this, see the appropriate documentation
 for your distribution. For Debian and Ubuntu:
 .
   https://wiki.debian.org/SecureBoot
   https://wiki.ubuntu.com/UEFI/SecureBoot