Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package spectre-meltdown-checker for 
openSUSE:Factory checked in at 2022-04-01 21:36:16
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/spectre-meltdown-checker (Old)
 and      /work/SRC/openSUSE:Factory/.spectre-meltdown-checker.new.1900 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "spectre-meltdown-checker"

Fri Apr  1 21:36:16 2022 rev:11 rq:966406 version:0.45

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/spectre-meltdown-checker/spectre-meltdown-checker.changes
        2021-05-15 01:24:52.814878946 +0200
+++ 
/work/SRC/openSUSE:Factory/.spectre-meltdown-checker.new.1900/spectre-meltdown-checker.changes
      2022-04-01 21:37:35.076524018 +0200
@@ -1,0 +2,37 @@
+Fri Apr  1 11:42:03 UTC 2022 - Marcus Meissner <meiss...@suse.com>
+
+- updated to 0.45
+  - arm64: phytium: Add CPU Implementer Phytium
+  - arm64: variant 4: detect ssbd mitigation from kernel img, system.map or 
kconfig
+  - chore: ensure vars are set before being dereferenced (set -u compat)
+  - chore: fix indentation
+  - chore: fwdb: update to v220+i20220208
+  - chore: only attempt to load msr and cpuid module once
+  - chore: read_cpuid: use named constants
+  - chore: readme: framapic is gone, host the screenshots on GitHub
+  - chore: replace 'Vulnerable to' by 'Affected by' in the hw section
+  - chore: speculative execution -> transient execution
+  - chore: update fwdb to v222+i20220208
+  - chore: update Intel Family 6 models
+  - chore: wording: model not vulnerable -> model not affected
+  - doc: add an FAQ entry about CVE support
+  - doc: add an FAQ.md and update the README.md accordingly
+  - doc: more FAQ and README
+  - doc: readme: make the FAQ entry more visible
+  - feat: add --allow-msr-write, no longer write by default (#385), detect 
when writing is denied
+  - feat: add --cpu, apply changes to (read|write)_msr, update fwdb to 
v221+i20220208
+  - feat: add subleaf != 0 support for read_cpuid
+  - feat: arm: add Cortex A77 and Neoverse-N1 (fixes #371)
+  - feat: bsd: for unimplemented CVEs, at least report when CPU is not affected
+  - feat: hw check: add IPRED, RRSBA, BHI features check
+  - feat: implement detection for MCEPSC under BSD
+  - feat: set default TMPDIR for Android (#415)
+  - fix: extract_kernel: don't overwrite kernel_err if already set
+  - fix: has_vmm false positive with pcp
+  - fix: is_ucode_blacklisted: fix some model names
+  - fix: mcedb: v191 changed the MCE table format
+  - fix: refuse to run under MacOS and ESXi
+  - fix: retpoline: detection on 5.15.28+ (#420)
+  - fix: variant4: added case where prctl ssbd status is tagged as 'unknown'
+
+-------------------------------------------------------------------

Old:
----
  v0.44.tar.gz

New:
----
  v0.45.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ spectre-meltdown-checker.spec ++++++
--- /var/tmp/diff_new_pack.E4ijsT/_old  2022-04-01 21:37:35.604518227 +0200
+++ /var/tmp/diff_new_pack.E4ijsT/_new  2022-04-01 21:37:35.608518183 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package spectre-meltdown-checker
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           spectre-meltdown-checker
-Version:        0.44
+Version:        0.45
 Release:        0
 Summary:        Spectre & Meltdown Vulnerability Checker
 License:        GPL-3.0-only

++++++ v0.44.tar.gz -> v0.45.tar.gz ++++++
++++ 3187 lines of diff (skipped)

Reply via email to