Hello community,

here is the log from the commit of package spectre-meltdown-checker for 
openSUSE:Factory checked in at 2019-12-12 23:17:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/spectre-meltdown-checker (Old)
 and      /work/SRC/openSUSE:Factory/.spectre-meltdown-checker.new.4691 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "spectre-meltdown-checker"

Thu Dec 12 23:17:38 2019 rev:8 rq:755736 version:0.43

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/spectre-meltdown-checker/spectre-meltdown-checker.changes
        2019-06-26 16:05:28.607751881 +0200
+++ 
/work/SRC/openSUSE:Factory/.spectre-meltdown-checker.new.4691/spectre-meltdown-checker.changes
      2019-12-12 23:17:43.922215804 +0100
@@ -1,0 +2,28 @@
+Wed Dec 11 07:37:50 UTC 2019 - Marcus Meissner <meiss...@suse.com>
+
+- version 0.43
+  - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)
+  - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 
bsc#1117665)
+  - feat: taa: add TSX_CTRL MSR detection in hardware info
+  - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware 
version database
+  - feat: use --live with --kernel/--config/--map to override file detection 
in live mode
+  - enh: rework the vuln logic of MDS with --paranoid (fixes #307)
+  - enh: explain that Enhanced IBRS is better for performance than classic IBRS
+  - enh: kernel: autodetect customized arch kernels from cmdline
+  - enh: kernel decompression: better tolerance against missing tools
+  - enh: mock: implement reading from /proc/cmdline
+  - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a
+  - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)
+  - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels
+  - fix: sgx: on locked down kernels, fallback to CPUID bit for detection
+  - fix: fwdb: builtin version takes precedence if the local cached version is 
older
+  - fix: pteinv: don't check kernel image if not available
+  - fix: silence useless error from grep (fixes #322)
+  - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)
+  - fix: mocking value for read_msr
+  - chore: rename mcedb cmdline parameters to fwdb, and change db version 
scheme
+  - chore: fwdb: update to v130.20191104+i20191027
+  - chore: add GitHub check workflow
+- upstream tarball no longer includes license, use the gpl 3 standalone html 
for it
+
+-------------------------------------------------------------------

Old:
----
  v0.42.tar.gz

New:
----
  gpl-3.0-standalone.html
  v0.43.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ spectre-meltdown-checker.spec ++++++
--- /var/tmp/diff_new_pack.PvWZeZ/_old  2019-12-12 23:17:46.402215581 +0100
+++ /var/tmp/diff_new_pack.PvWZeZ/_new  2019-12-12 23:17:46.406215581 +0100
@@ -17,13 +17,14 @@
 
 
 Name:           spectre-meltdown-checker
-Version:        0.42
+Version:        0.43
 Release:        0
 Summary:        Spectre & Meltdown Vulnerability Checker
 License:        GPL-3.0-only
 Group:          Productivity/Security
 Url:            https://github.com/speed47/spectre-meltdown-checker
 Source:         
https://github.com/speed47/spectre-meltdown-checker/archive/v%version.tar.gz
+Source1:        https://www.gnu.org/licenses/gpl-3.0-standalone.html
 ExclusiveArch:  %ix86 x86_64
 
 %description
@@ -44,6 +45,8 @@
 
 %build
 
+cp %SOURCE1 .
+
 %install
 mkdir -p %buildroot/usr/bin
 install -m 0755 spectre-meltdown-checker.sh %buildroot/usr/bin/
@@ -52,7 +55,7 @@
 exec bash -n spectre-meltdown-checker.sh
 
 %files
-%license LICENSE
+%license gpl-3.0-standalone.html
 %doc README.md
 %{_bindir}/*
 

++++++ gpl-3.0-standalone.html ++++++
++++ 696 lines (skipped)

++++++ v0.42.tar.gz -> v0.43.tar.gz ++++++
++++ 2781 lines of diff (skipped)


Reply via email to