- xen (4.14.4+74-gd7b22226b5-1+rpi1) bullseye-staging; urgency=medium
++xen (4.14.5+24-g87d90d511c-1+rpi1) bullseye-staging; urgency=medium
+
+ [changes brought forward from 4.4.1-9+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Sun, 30 Aug 2015 15:43:16 +0000]
+ * replace "dmb" with "mcr p15, #0, r0, c7, c10, #5" for armv6
+
+ [changes introduced in 4.6.0-1+rpi1 by Peter Michael Green]
+ * Use kernel 3.18 for now as I haven't dealt with 4.x yet.
+
+ [changes introduced in 4.11.1+26-g87f51bf366-3+rpi1 by Peter Michael Green]
+ * Do not fail on files that are not installed.
+
- -- Raspbian forward porter <root@raspbian.org> Sun, 10 Apr 2022 21:56:57 +0000
++ -- Raspbian forward porter <root@raspbian.org> Tue, 19 Jul 2022 10:00:46 +0000
++
+ xen (4.14.5+24-g87d90d511c-1) bullseye-security; urgency=medium
+
+ * Update to new upstream version 4.14.5+24-g87d90d511c, which also contains
+ security fixes for the following issues:
+ for the following issues:
+ - x86 pv: Race condition in typeref acquisition
+ XSA-401 CVE-2022-26362
+ - x86 pv: Insufficient care with non-coherent mappings
+ XSA-402 CVE-2022-26363 CVE-2022-26364
+ - x86: MMIO Stale Data vulnerabilities
+ XSA-404 CVE-2022-21123 CVE-2022-21125 CVE-2022-21166
+ - Retbleed - arbitrary speculative code execution with return instructions
+ XSA-407 CVE-2022-23816 CVE-2022-23825 CVE-2022-29900
+ * Note that the following XSA are not listed, because...
+ - XSA-403 patches are not applied to stable branch lines.
+ - XSA-405 and XSA-406 have patches for the Linux kernel.
+
+ -- Hans van Kranenburg <hans@knorrie.org> Wed, 13 Jul 2022 16:28:39 +0200
xen (4.14.4+74-gd7b22226b5-1) bullseye-security; urgency=medium