[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted linux-signed-arm64 4.19.37+2 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 14 May 2019 17:34:37 +0100
Source: linux-signed-arm64
Binary: kernel-image-4.19.0-5-arm64-di nic-modules-4.19.0-5-arm64-di nic-wireless-modules-4.19.0-5-arm64-di nic-shared-modules-4.19.0-5-arm64-di usb-serial-modules-4.19.0-5-arm64-di ppp-modules-4.19.0-5-arm64-di cdrom-core-modules-4.19.0-5-arm64-di scsi-core-modules-4.19.0-5-arm64-di scsi-modules-4.19.0-5-arm64-di scsi-nic-modules-4.19.0-5-arm64-di loop-modules-4.19.0-5-arm64-di btrfs-modules-4.19.0-5-arm64-di ext4-modules-4.19.0-5-arm64-di isofs-modules-4.19.0-5-arm64-di jfs-modules-4.19.0-5-arm64-di xfs-modules-4.19.0-5-arm64-di fat-modules-4.19.0-5-arm64-di md-modules-4.19.0-5-arm64-di multipath-modules-4.19.0-5-arm64-di usb-modules-4.19.0-5-arm64-di usb-storage-modules-4.19.0-5-arm64-di fb-modules-4.19.0-5-arm64-di input-modules-4.19.0-5-arm64-di event-modules-4.19.0-5-arm64-di nic-usb-modules-4.19.0-5-arm64-di sata-modules-4.19.0-5-arm64-di i2c-modules-4.19.0-5-arm64-di crc-modules-4.19.0-5-arm64-di crypto-modules-4.19.0-5-arm64-di crypto-dm-modules-4.19.0-5-arm64-di
 efi-modules-4.19.0-5-arm64-di ata-modules-4.19.0-5-arm64-di mmc-modules-4.19.0-5-arm64-di nbd-modules-4.19.0-5-arm64-di squashfs-modules-4.19.0-5-arm64-di uinput-modules-4.19.0-5-arm64-di compress-modules-4.19.0-5-arm64-di leds-modules-4.19.0-5-arm64-di udf-modules-4.19.0-5-arm64-di fuse-modules-4.19.0-5-arm64-di mtd-core-modules-4.19.0-5-arm64-di linux-image-4.19.0-5-arm64
 linux-image-4.19.0-5-rt-arm64
Architecture: source
Version: 4.19.37+2
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <ben@decadent.org.uk>
Description:
 ata-modules-4.19.0-5-arm64-di - ATA disk modules (udeb)
 btrfs-modules-4.19.0-5-arm64-di - BTRFS filesystem support (udeb)
 cdrom-core-modules-4.19.0-5-arm64-di - CDROM support (udeb)
 compress-modules-4.19.0-5-arm64-di - lzo modules (udeb)
 crc-modules-4.19.0-5-arm64-di - CRC modules (udeb)
 crypto-dm-modules-4.19.0-5-arm64-di - devicemapper crypto module (udeb)
 crypto-modules-4.19.0-5-arm64-di - crypto modules (udeb)
 efi-modules-4.19.0-5-arm64-di - EFI modules (udeb)
 event-modules-4.19.0-5-arm64-di - Event support (udeb)
 ext4-modules-4.19.0-5-arm64-di - ext2/ext3/ext4 filesystem support (udeb)
 fat-modules-4.19.0-5-arm64-di - FAT filesystem support (udeb)
 fb-modules-4.19.0-5-arm64-di - Frame buffer support (udeb)
 fuse-modules-4.19.0-5-arm64-di - FUSE modules (udeb)
 i2c-modules-4.19.0-5-arm64-di - i2c support modules (udeb)
 input-modules-4.19.0-5-arm64-di - Input devices support (udeb)
 isofs-modules-4.19.0-5-arm64-di - ISOFS filesystem support (udeb)
 jfs-modules-4.19.0-5-arm64-di - JFS filesystem support (udeb)
 kernel-image-4.19.0-5-arm64-di - Linux kernel image and core modules for the Debian installer (udeb)
 leds-modules-4.19.0-5-arm64-di - LED modules (udeb)
 linux-image-4.19.0-5-arm64 - ${unsigned:DescriptionShort} (signed)
 linux-image-4.19.0-5-rt-arm64 - ${unsigned:DescriptionShort} (signed)
 loop-modules-4.19.0-5-arm64-di - Loopback filesystem support (udeb)
 md-modules-4.19.0-5-arm64-di - RAID and LVM support (udeb)
 mmc-modules-4.19.0-5-arm64-di - MMC/SD card modules (udeb)
 mtd-core-modules-4.19.0-5-arm64-di - MTD core (udeb)
 multipath-modules-4.19.0-5-arm64-di - Multipath support (udeb)
 nbd-modules-4.19.0-5-arm64-di - Network Block Device modules (udeb)
 nic-modules-4.19.0-5-arm64-di - NIC drivers (udeb)
 nic-shared-modules-4.19.0-5-arm64-di - Shared NIC drivers (udeb)
 nic-usb-modules-4.19.0-5-arm64-di - USB NIC drivers (udeb)
 nic-wireless-modules-4.19.0-5-arm64-di - Wireless NIC drivers (udeb)
 ppp-modules-4.19.0-5-arm64-di - PPP drivers (udeb)
 sata-modules-4.19.0-5-arm64-di - SATA drivers (udeb)
 scsi-core-modules-4.19.0-5-arm64-di - Core SCSI subsystem (udeb)
 scsi-modules-4.19.0-5-arm64-di - SCSI drivers (udeb)
 scsi-nic-modules-4.19.0-5-arm64-di - SCSI drivers for converged NICs (udeb)
 squashfs-modules-4.19.0-5-arm64-di - squashfs modules (udeb)
 udf-modules-4.19.0-5-arm64-di - UDF modules (udeb)
 uinput-modules-4.19.0-5-arm64-di - uinput support (udeb)
 usb-modules-4.19.0-5-arm64-di - USB support (udeb)
 usb-serial-modules-4.19.0-5-arm64-di - USB serial drivers (udeb)
 usb-storage-modules-4.19.0-5-arm64-di - USB storage support (udeb)
 xfs-modules-4.19.0-5-arm64-di - XFS filesystem support (udeb)
Changes:
 linux-signed-arm64 (4.19.37+2) unstable; urgency=high
 .
   * Sign kernel from linux 4.19.37-2
 .
   * debian/bin: Fix Python static checker regressions (Closes: #928618)
   * Clean up speculation mitigations:
     - Documentation/l1tf: Fix small spelling typo
     - x86/cpu: Sanitize FAM6_ATOM naming
     - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
     - x86/msr-index: Cleanup bit defines
     - x86/speculation: Consolidate CPU whitelists
     - Documentation: Move L1TF to separate directory
     - cpu/speculation: Add 'mitigations=' cmdline option
     - x86/speculation: Support 'mitigations=' cmdline option
     - powerpc/speculation: Support 'mitigations=' cmdline option
     - s390/speculation: Support 'mitigations=' cmdline option
     - x86/speculation/mds: Add 'mitigations=' support for MDS
   * [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
     (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091):
     - x86/speculation/mds: Add basic bug infrastructure for MDS
     - x86/speculation/mds: Add BUG_MSBDS_ONLY
     - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
     - x86/speculation/mds: Add mds_clear_cpu_buffers()
     - x86/speculation/mds: Clear CPU buffers on exit to user
     - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
     - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
     - x86/speculation/mds: Add mitigation control for MDS
     - x86/speculation/mds: Add sysfs reporting for MDS
     - x86/speculation/mds: Add mitigation mode VMWERV
     - Documentation: Add MDS vulnerability documentation
     - x86/speculation/mds: Add mds=full,nosmt cmdline option
     - x86/speculation: Move arch_smt_update() call to after mitigation decisions
     - x86/speculation/mds: Add SMT warning message
     - x86/speculation/mds: Fix comment
     - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
     - x86/mds: Add MDSUM variant to the MDS documentation
     - Documentation: Correct the possible MDS sysfs values
     - x86/speculation/mds: Fix documentation typo
   * [x86] linux-cpupower: Update CPPFLAGS for change in <asm/msr-index.h>
Checksums-Sha1:
 7b27bec6872a184a1100de310c25f962dd99a41e 6509 linux-signed-arm64_4.19.37+2.dsc
 0568689982845920ef6b6fbdc9414fe09fb5820b 1815220 linux-signed-arm64_4.19.37+2.tar.xz
Checksums-Sha256:
 26af784f2ef78262ca657790779c9fd5b7d2b83569784d77345e7eb2e70b4898 6509 linux-signed-arm64_4.19.37+2.dsc
 c1c27ef077747614f8be25e18407705539d2bc4c89860a90e35c3111b0f97410 1815220 linux-signed-arm64_4.19.37+2.tar.xz
Files:
 c3b696673c37399d19749f208bcefed4 6509 kernel optional linux-signed-arm64_4.19.37+2.dsc
 7674e82c68f4ef1c0c2d76f3028ebd06 1815220 kernel optional linux-signed-arm64_4.19.37+2.tar.xz

-----BEGIN PGP SIGNATURE-----
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=W+Y1
-----END PGP SIGNATURE-----


Reply to: