[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

linux-signed-i386_6.4.4+3_source.changes ACCEPTED into unstable



Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 19:08:55 +0200
Source: linux-signed-i386
Architecture: source
Version: 6.4.4+3
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux-signed-i386 (6.4.4+3) unstable; urgency=high
 .
   * Sign kernel from linux 6.4.4-3
 .
   * io_uring: gate iowait schedule on having pending requests (Closes: #1041855)
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
     - x86/srso: Tie SBPB bit setting to microcode patch detection
   * Bump ABI to 2
Checksums-Sha1:
 582d870f7a04eb258fb60c549faf1d38dcf56b73 13808 linux-signed-i386_6.4.4+3.dsc
 edae550ebbca2bc4d529f24845bd6e2b0d1097db 3938496 linux-signed-i386_6.4.4+3.tar.xz
Checksums-Sha256:
 99bc4388e141ef69ac62d92a088864c40065454797072dab50e68c7347dd0dab 13808 linux-signed-i386_6.4.4+3.dsc
 125c49f20f96d0571fbd59698b07af7a092981226659648e429546928b6e6cf2 3938496 linux-signed-i386_6.4.4+3.tar.xz
Files:
 71624516091802ffe32df64f53d6005d 13808 kernel optional linux-signed-i386_6.4.4+3.dsc
 75c6852d851374cdc524c401ad5576f4 3938496 kernel optional linux-signed-i386_6.4.4+3.tar.xz

-----BEGIN PGP SIGNATURE-----
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=c1pd
-----END PGP SIGNATURE-----


Reply to: