Accepted linux-signed-arm64 4.19.37+2 (source) into unstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 14 May 2019 17:34:37 +0100
Source: linux-signed-arm64
Binary: kernel-image-4.19.0-5-arm64-di nic-modules-4.19.0-5-arm64-di nic-wireless-modules-4.19.0-5-arm64-di nic-shared-modules-4.19.0-5-arm64-di usb-serial-modules-4.19.0-5-arm64-di ppp-modules-4.19.0-5-arm64-di cdrom-core-modules-4.19.0-5-arm64-di scsi-core-modules-4.19.0-5-arm64-di scsi-modules-4.19.0-5-arm64-di scsi-nic-modules-4.19.0-5-arm64-di loop-modules-4.19.0-5-arm64-di btrfs-modules-4.19.0-5-arm64-di ext4-modules-4.19.0-5-arm64-di isofs-modules-4.19.0-5-arm64-di jfs-modules-4.19.0-5-arm64-di xfs-modules-4.19.0-5-arm64-di fat-modules-4.19.0-5-arm64-di md-modules-4.19.0-5-arm64-di multipath-modules-4.19.0-5-arm64-di usb-modules-4.19.0-5-arm64-di usb-storage-modules-4.19.0-5-arm64-di fb-modules-4.19.0-5-arm64-di input-modules-4.19.0-5-arm64-di event-modules-4.19.0-5-arm64-di nic-usb-modules-4.19.0-5-arm64-di sata-modules-4.19.0-5-arm64-di i2c-modules-4.19.0-5-arm64-di crc-modules-4.19.0-5-arm64-di crypto-modules-4.19.0-5-arm64-di crypto-dm-modules-4.19.0-5-arm64-di
efi-modules-4.19.0-5-arm64-di ata-modules-4.19.0-5-arm64-di mmc-modules-4.19.0-5-arm64-di nbd-modules-4.19.0-5-arm64-di squashfs-modules-4.19.0-5-arm64-di uinput-modules-4.19.0-5-arm64-di compress-modules-4.19.0-5-arm64-di leds-modules-4.19.0-5-arm64-di udf-modules-4.19.0-5-arm64-di fuse-modules-4.19.0-5-arm64-di mtd-core-modules-4.19.0-5-arm64-di linux-image-4.19.0-5-arm64
linux-image-4.19.0-5-rt-arm64
Architecture: source
Version: 4.19.37+2
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Ben Hutchings <ben@decadent.org.uk>
Description:
ata-modules-4.19.0-5-arm64-di - ATA disk modules (udeb)
btrfs-modules-4.19.0-5-arm64-di - BTRFS filesystem support (udeb)
cdrom-core-modules-4.19.0-5-arm64-di - CDROM support (udeb)
compress-modules-4.19.0-5-arm64-di - lzo modules (udeb)
crc-modules-4.19.0-5-arm64-di - CRC modules (udeb)
crypto-dm-modules-4.19.0-5-arm64-di - devicemapper crypto module (udeb)
crypto-modules-4.19.0-5-arm64-di - crypto modules (udeb)
efi-modules-4.19.0-5-arm64-di - EFI modules (udeb)
event-modules-4.19.0-5-arm64-di - Event support (udeb)
ext4-modules-4.19.0-5-arm64-di - ext2/ext3/ext4 filesystem support (udeb)
fat-modules-4.19.0-5-arm64-di - FAT filesystem support (udeb)
fb-modules-4.19.0-5-arm64-di - Frame buffer support (udeb)
fuse-modules-4.19.0-5-arm64-di - FUSE modules (udeb)
i2c-modules-4.19.0-5-arm64-di - i2c support modules (udeb)
input-modules-4.19.0-5-arm64-di - Input devices support (udeb)
isofs-modules-4.19.0-5-arm64-di - ISOFS filesystem support (udeb)
jfs-modules-4.19.0-5-arm64-di - JFS filesystem support (udeb)
kernel-image-4.19.0-5-arm64-di - Linux kernel image and core modules for the Debian installer (udeb)
leds-modules-4.19.0-5-arm64-di - LED modules (udeb)
linux-image-4.19.0-5-arm64 - ${unsigned:DescriptionShort} (signed)
linux-image-4.19.0-5-rt-arm64 - ${unsigned:DescriptionShort} (signed)
loop-modules-4.19.0-5-arm64-di - Loopback filesystem support (udeb)
md-modules-4.19.0-5-arm64-di - RAID and LVM support (udeb)
mmc-modules-4.19.0-5-arm64-di - MMC/SD card modules (udeb)
mtd-core-modules-4.19.0-5-arm64-di - MTD core (udeb)
multipath-modules-4.19.0-5-arm64-di - Multipath support (udeb)
nbd-modules-4.19.0-5-arm64-di - Network Block Device modules (udeb)
nic-modules-4.19.0-5-arm64-di - NIC drivers (udeb)
nic-shared-modules-4.19.0-5-arm64-di - Shared NIC drivers (udeb)
nic-usb-modules-4.19.0-5-arm64-di - USB NIC drivers (udeb)
nic-wireless-modules-4.19.0-5-arm64-di - Wireless NIC drivers (udeb)
ppp-modules-4.19.0-5-arm64-di - PPP drivers (udeb)
sata-modules-4.19.0-5-arm64-di - SATA drivers (udeb)
scsi-core-modules-4.19.0-5-arm64-di - Core SCSI subsystem (udeb)
scsi-modules-4.19.0-5-arm64-di - SCSI drivers (udeb)
scsi-nic-modules-4.19.0-5-arm64-di - SCSI drivers for converged NICs (udeb)
squashfs-modules-4.19.0-5-arm64-di - squashfs modules (udeb)
udf-modules-4.19.0-5-arm64-di - UDF modules (udeb)
uinput-modules-4.19.0-5-arm64-di - uinput support (udeb)
usb-modules-4.19.0-5-arm64-di - USB support (udeb)
usb-serial-modules-4.19.0-5-arm64-di - USB serial drivers (udeb)
usb-storage-modules-4.19.0-5-arm64-di - USB storage support (udeb)
xfs-modules-4.19.0-5-arm64-di - XFS filesystem support (udeb)
Changes:
linux-signed-arm64 (4.19.37+2) unstable; urgency=high
.
* Sign kernel from linux 4.19.37-2
.
* debian/bin: Fix Python static checker regressions (Closes: #928618)
* Clean up speculation mitigations:
- Documentation/l1tf: Fix small spelling typo
- x86/cpu: Sanitize FAM6_ATOM naming
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
- x86/msr-index: Cleanup bit defines
- x86/speculation: Consolidate CPU whitelists
- Documentation: Move L1TF to separate directory
- cpu/speculation: Add 'mitigations=' cmdline option
- x86/speculation: Support 'mitigations=' cmdline option
- powerpc/speculation: Support 'mitigations=' cmdline option
- s390/speculation: Support 'mitigations=' cmdline option
- x86/speculation/mds: Add 'mitigations=' support for MDS
* [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
(CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091):
- x86/speculation/mds: Add basic bug infrastructure for MDS
- x86/speculation/mds: Add BUG_MSBDS_ONLY
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
- x86/speculation/mds: Add mds_clear_cpu_buffers()
- x86/speculation/mds: Clear CPU buffers on exit to user
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry
- x86/speculation/mds: Add mitigation control for MDS
- x86/speculation/mds: Add sysfs reporting for MDS
- x86/speculation/mds: Add mitigation mode VMWERV
- Documentation: Add MDS vulnerability documentation
- x86/speculation/mds: Add mds=full,nosmt cmdline option
- x86/speculation: Move arch_smt_update() call to after mitigation decisions
- x86/speculation/mds: Add SMT warning message
- x86/speculation/mds: Fix comment
- x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
- x86/mds: Add MDSUM variant to the MDS documentation
- Documentation: Correct the possible MDS sysfs values
- x86/speculation/mds: Fix documentation typo
* [x86] linux-cpupower: Update CPPFLAGS for change in <asm/msr-index.h>
Checksums-Sha1:
7b27bec6872a184a1100de310c25f962dd99a41e 6509 linux-signed-arm64_4.19.37+2.dsc
0568689982845920ef6b6fbdc9414fe09fb5820b 1815220 linux-signed-arm64_4.19.37+2.tar.xz
Checksums-Sha256:
26af784f2ef78262ca657790779c9fd5b7d2b83569784d77345e7eb2e70b4898 6509 linux-signed-arm64_4.19.37+2.dsc
c1c27ef077747614f8be25e18407705539d2bc4c89860a90e35c3111b0f97410 1815220 linux-signed-arm64_4.19.37+2.tar.xz
Files:
c3b696673c37399d19749f208bcefed4 6509 kernel optional linux-signed-arm64_4.19.37+2.dsc
7674e82c68f4ef1c0c2d76f3028ebd06 1815220 kernel optional linux-signed-arm64_4.19.37+2.tar.xz
-----BEGIN PGP SIGNATURE-----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=W+Y1
-----END PGP SIGNATURE-----