Thank you for your contribution to Debian.


Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 20:31:30 +0200
Source: linux
Architecture: source
Version: 6.4.4-3~bpo12+1
Distribution: bookworm-backports
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <b...@debian.org>
Closes: 1041855
Changes:
 linux (6.4.4-3~bpo12+1) bookworm-backports; urgency=medium
 .
   * Rebuild for bookworm-backports:
     - Set ABI to 0.deb12.2
 .
 linux (6.4.4-3) unstable; urgency=high
 .
   * io_uring: gate iowait schedule on having pending requests (Closes: 
#1041855)
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
     - x86/srso: Tie SBPB bit setting to microcode patch detection
   * Bump ABI to 2
 .
 linux (6.4.4-2) unstable; urgency=high
 .
   [ John Paul Adrian Glaubitz ]
   * [sh4] Add i2c-modules udeb for sh7785lcr flavor
 .
   [ Salvatore Bonaccorso ]
   * [x86] cpu/amd: Move the errata checking functionality up
   * [x86] cpu/amd: Add a Zenbleed fix (CVE-2023-20593)
   * net/sched: cls_fw: Fix improper refcount update leads to use-after-free
     (CVE-2023-3776)
   * net/sched: sch_qfq: account for stab overhead in qfq_enqueue 
(CVE-2023-3611)
Checksums-Sha1:
 e87a08f996fcca2e1258d1e2fd8aa0ca3dd4c567 311678 linux_6.4.4-3~bpo12+1.dsc
 0b75f1a64135e8730ec31260534b1ee51beccf7b 1502088 
linux_6.4.4-3~bpo12+1.debian.tar.xz
 99619209ea93acbfeaab5628cbafbe8777a6109d 6012 
linux_6.4.4-3~bpo12+1_source.buildinfo
Checksums-Sha256:
 4505611d0d0567204caeaef74f36c3c4988858ab47ebaeebb4958488e47c9f9c 311678 
linux_6.4.4-3~bpo12+1.dsc
 1c355d53b40e2d5425c866e6581569cb952ba66a86c8edb24b64088c0606990c 1502088 
linux_6.4.4-3~bpo12+1.debian.tar.xz
 4559ce1b9b5929c75b9f5853aab9da10429db5b697469d72536139ca067d9929 6012 
linux_6.4.4-3~bpo12+1_source.buildinfo
Files:
 e8fb63bd553ac8d811877f73dc628bb5 311678 kernel optional 
linux_6.4.4-3~bpo12+1.dsc
 4589679205f58d4d2f20911dd2d509e2 1502088 kernel optional 
linux_6.4.4-3~bpo12+1.debian.tar.xz
 82db76b324fa78a1ba8a3025f7b6f2a9 6012 kernel optional 
linux_6.4.4-3~bpo12+1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=9pK7
-----END PGP SIGNATURE-----

Reply via email to