drm/i915/psr: Do not use pipe_src as borders for SU area
From Jouni Hogander
de9aa7e89b98157d2650f25691e40711b8404151 in linux-6.18.y/6.18.23
75519f5df2a9b23f7bf305e12dc9a6e3e65c24b7 in mainline linux
drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
From Sebastian Brzezinka
2af8b200cae3fdd0e917ecc2753b28bb40c876c1 in linux-6.18.y/6.18.23
4c71fd099513bfa8acab529b626e1f0097b76061 in mainline linux
login_chpass: No longer need to install this setuid root
When the YP code was removed login_chpass became wrapper that just
execs login_lchpass.
OK deraadt@
floating point state leakage can be observed on AMD Zen/Zen+ (Zen 1)
This was discovered by the Rootsec research group at the CISPA Helmholtz
Center for Information Security. Rootsec named the problem
Floating Point Divider State Sampling (FP-DSS).
Do AMD's suggested mitigation, setting a chicken bit in an MSR.
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7053.htmlhttps://roots.ec/blog/fpdss/
ok deraadt@ brynet@
Stop cleaning gem artifacts
Bulk builds have seen occasional failures building
textproc/ruby-commonmarker, which is the only reverse dependency. I'm
not positive the cleaning of gem artifacts is the cause of the failure,
though I suspect it is.
Discussed with naddy@
Prevent buffer overflow by checking the correct counter.
An attacker on the same layer 2 network can send rogue router
advertisements, potentially crashing slaacd.
from Maurice Hieronymus (mhi AT mailbox.org), thanks!
from florian@; OK deraadt
this is errata/7.7/039_slaacd.patch.sig
Prevent buffer overflow by checking the correct counter.
An attacker on the same layer 2 network can send rogue router
advertisements, potentially crashing slaacd.
from Maurice Hieronymus (mhi AT mailbox.org), thanks!
from florian@; OK deraadt
this is errata/7.8/033_slaacd.patch.sig