[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

linux_6.1.38-4~bpo11+1_source.changes ACCEPTED into bullseye-backports



Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 20:26:19 +0200
Source: linux
Architecture: source
Version: 6.1.38-4~bpo11+1
Distribution: bullseye-backports
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <benh@debian.org>
Changes:
 linux (6.1.38-4~bpo11+1) bullseye-backports; urgency=medium
 .
   * Rebuild for bullseye-backports:
     - Set ABI to 0.deb11.11
 .
 linux (6.1.38-4) bookworm-security; urgency=high
 .
   * Fix "init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()"
     backport
 .
 linux (6.1.38-3) bookworm-security; urgency=high
 .
   [ Salvatore Bonaccorso ]
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - x86/mm: fix poking_init() for Xen PV guests
     - x86/mm: Use mm_alloc() in poking_init()
     - mm: Move mm_cachep initialization to mm_init()
     - x86/mm: Initialize text poking earlier
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
   * Bump ABI to 11
 .
   [ Ben Hutchings ]
   * [x86] Add missing pieces of SRSO mitigation:
     - x86/cpu, kvm: Add support for CPUID_80000021_EAX
     - x86/srso: Tie SBPB bit setting to microcode patch detection
Checksums-Sha1:
 3e1f48b10af41dfec219194233e0d9194e58ef65 313386 linux_6.1.38-4~bpo11+1.dsc
 e937627505cde3922dccb046a15cdbd4d53660af 1520372 linux_6.1.38-4~bpo11+1.debian.tar.xz
 0a46cfb02822ca446c4c083cfb2cf042c50e7e40 6205 linux_6.1.38-4~bpo11+1_source.buildinfo
Checksums-Sha256:
 f0b638d08fd67bd30a559ec969165d30f8447363b8f79e8a931f3b8a17d7d4b0 313386 linux_6.1.38-4~bpo11+1.dsc
 5ccb779dd331016ea41321c864f69f0980c8674579f3684cbad105d36b294e27 1520372 linux_6.1.38-4~bpo11+1.debian.tar.xz
 4c1023b034db838a4c101524d5158eb23facc19e3f0367c25e2ad7dd279977c2 6205 linux_6.1.38-4~bpo11+1_source.buildinfo
Files:
 9bf44d2c8fc4d7bb94ebdf0bc1a7b58a 313386 kernel optional linux_6.1.38-4~bpo11+1.dsc
 8375ef6737750ea089922ad9b1b7e804 1520372 kernel optional linux_6.1.38-4~bpo11+1.debian.tar.xz
 49a015af5776301ff83912d766bfa492 6205 kernel optional linux_6.1.38-4~bpo11+1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAmTTzHIACgkQ57/I7JWG
EQlTtg//T1aoAhGU9TbC2W+eotR5VofSaVX5LmEUkRdagS9plwN4UmT+mX9thshD
nW3pDDpgzi8qSgdJWi7IATEIq9ASsQr0ieZnVTP70oDA1iSxzWqd7GI1lgbpBrBx
CCdkXG5+CP+jKL1nu5wlhI9azItoD6NrapnFNJCrRJgHtXTn1epxnQ/KZz3qNGVn
Kd8fGTTisssC4DQVZI/ZfAiPxIxCjgAYtUebQvzP/7D40r9dTRPbAyolvheUiN3s
ycv+QTsB4LEXbkHT6M7ITsR8QFZ8gWv3CGlJvhioDtD2f4xTaON17Jd1a2vYuMo9
i5KqX5RsDxwLV0GAjxya/lQaml0YsNgNqjggDBfPYXp1GmKHDrS6DKv5Y7RZx2rf
qHXUqeMg2xU97SZ6RfaPchu3JTEIp/QrqLY7g4E+nytYBY2wn5v3t+TaTj8Qaixw
fBrIrsJjCy4vtMGSmaEfITj73bUuHpAcuRmr8MiHMttOjG/Nec5a/qRAQUZtJ8/4
AtpNPp99KxGb9DVli/7DBAmAGF3cY5lb0vxC/r5+f/OC5S+Z4KIfhqIYfxNgxPmV
qlIbI6ILfoFe4dq1EeB+qLTP4zvaji27m/EXS0oa6xgw6phx0hFsOLR84uGx6Jdq
dGMRPL4zoaoLSYDHalT6YK2pzcmtNGy4Hz72m0fRHA5cAsXICr0=
=vPRT
-----END PGP SIGNATURE-----


Reply to: