Back to xen PTS page

Accepted xen 4.4.1-9+deb8u8 (all source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 03 Dec 2016 12:12:53 +0100
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture: all source
Version: 4.4.1-9+deb8u8
Distribution: jessie-security
Urgency: high
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 845663 845664 845665 845668 845670
Description: 
 libxen-4.4 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-hypervisor-4.4-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.4-arm64 - Xen Hypervisor on ARM64
 xen-hypervisor-4.4-armhf - Xen Hypervisor on ARMHF
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-arm64 - Xen System on ARM64 (meta-package)
 xen-system-armhf - Xen System on ARMHF (meta-package)
 xen-utils-4.4 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Changes:
 xen (4.4.1-9+deb8u8) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * CVE-2016-7777: CR0.TS and CR0.EM not always honored for x86 HVM guests
   * CVE-2016-9386: x86 null segments not always treated as unusable
     (Closes: #845663)
   * CVE-2016-9382: x86 task switch to VM86 mode mis-handled (Closes: #845664)
   * CVE-2016-9385: x86 segment base write emulation lacking canonical address
     checks (Closes: #845665)
   * CVE-2016-9383: x86 64-bit bit test instruction emulation broken
     (Closes: #845668)
   * CVE-2016-9379, CVE-2016-9380: delimiter injection vulnerabilities in
     pygrub (Closes: #845670)
Checksums-Sha1: 
 941848efaef9535a44f3d9664872cf209c192475 3146 xen_4.4.1-9+deb8u8.dsc
 897ea88ea02277175b82eadf820052e36cfb1cec 113128 xen_4.4.1-9+deb8u8.debian.tar.xz
 fbe86caf6a9891337e997e265d4370f12a6feb54 122284 xen-utils-common_4.4.1-9+deb8u8_all.deb
Checksums-Sha256: 
 8eaf73760c8dd762473d5e2cbb246ff846613a2d2c9ceffbb77d96e3a2772dc5 3146 xen_4.4.1-9+deb8u8.dsc
 f4bf2a68dc78ca97014d8d9f84e5d36f207b5ef768f20ca64edec66391314d6a 113128 xen_4.4.1-9+deb8u8.debian.tar.xz
 e353abb1fefb34341c05b4207039ce17ec90c8ed9d1686bb27c28e96655cb324 122284 xen-utils-common_4.4.1-9+deb8u8_all.deb
Files: 
 5135e1cce01b695a03e5ea33c24137f1 3146 kernel optional xen_4.4.1-9+deb8u8.dsc
 57fd28112c771a337dd0db14ca49af9d 113128 kernel optional xen_4.4.1-9+deb8u8.debian.tar.xz
 e6a197e146b03fc5439b102360634326 122284 kernel optional xen-utils-common_4.4.1-9+deb8u8_all.deb

-----BEGIN PGP SIGNATURE-----
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=0oOm
-----END PGP SIGNATURE-----