- xen (4.14.5+86-g1c354767d5-1+rpi1) bullseye-staging; urgency=medium
++xen (4.14.5+94-ge49571868d-1+rpi1) bullseye-staging; urgency=medium
+
+ [changes brought forward from 4.4.1-9+rpi1 by Peter Michael Green <plugwash@raspbian.org> at Sun, 30 Aug 2015 15:43:16 +0000]
+ * replace "dmb" with "mcr p15, #0, r0, c7, c10, #5" for armv6
+
+ [changes introduced in 4.6.0-1+rpi1 by Peter Michael Green]
+ * Use kernel 3.18 for now as I haven't dealt with 4.x yet.
+
+ [changes introduced in 4.11.1+26-g87f51bf366-3+rpi1 by Peter Michael Green]
+ * Do not fail on files that are not installed.
+
- -- Raspbian forward porter <root@raspbian.org> Wed, 09 Nov 2022 05:48:53 +0000
++ -- Raspbian forward porter <root@raspbian.org> Tue, 28 Mar 2023 23:10:31 +0000
++
+ xen (4.14.5+94-ge49571868d-1) bullseye-security; urgency=medium
+
+ * Update to new upstream version 4.14.5+94-ge49571868d, which also contains
+ security fixes for the following issues: (Closes: #1033297)
+ - x86: Multiple speculative security issues
+ XSA-422 CVE-2022-23824
+ - x86 shadow plus log-dirty mode use-after-free
+ XSA-427 CVE-2022-42332
+ - x86/HVM pinned cache attributes mis-handling
+ XSA-428 CVE-2022-42333 CVE-2022-42334
+ - x86: speculative vulnerability in 32bit SYSCALL path
+ XSA-429 CVE-2022-42331
+ * Note that the following XSA are not listed, because...
+ - XSA-423 and XSA-424 have patches for the Linux kernel.
+ - XSA-425 only applies to Xen 4.17 and newer
+ - XSA-426 only applies to Xen 4.16 and newer
+
+ -- Maximilian Engelhardt <maxi@daemonizer.de> Thu, 23 Mar 2023 20:40:49 +0100
xen (4.14.5+86-g1c354767d5-1) bullseye-security; urgency=medium