Accepted xen 4.17.0+74-g3eac216e6e-1 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted xen 4.17.0+74-g3eac216e6e-1 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 03 Apr 2023 13:49:31 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: xen_4.17.0+74-g3eac216e6e-1_source.changes
- Debian-source: xen
- Debian-suite: unstable
- Debian-version: 4.17.0+74-g3eac216e6e-1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=zgI107MoGbhBTDZGQGEIV4p2dI04Jk5YTBJIgfQEiJE=; b=JkX99ZkM8khhcIsrsDoPw9wNtJ HbeJ9xuA4FoaBZmRfHqzjDeL7N+I0JJXghrXR5qH4HAcnWDmehbQfjaWAc+8Zuhyz7ciUGp/gbXZ7 I7kkeNKPraNPrfdTT+WehbkkF561k9FezK3ellpZN4qBX/dYH4ML+VOFVKmOU+tOgWWv2U8os9cKS 6o3ah87dMgoFyXkIBWeJHeH/DL2Fuwl54jBiX+FbjDIpFncAQgHzpwZQrf8rjw8G3m2ovkcrr2BnV 1lhEh8duzL64UGbx+IOcXNpAfPxiXIKiM6O+HweYNG9TjVrqpuizOcuglGpcn1t8j4EOHlNvtIEC1 yh0jfDjQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1pjKYt-008LfB-5N@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 23 Mar 2023 22:22:48 +0100
Source: xen
Architecture: source
Version: 4.17.0+74-g3eac216e6e-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Maximilian Engelhardt <maxi@daemonizer.de>
Closes: 1033297
Changes:
xen (4.17.0+74-g3eac216e6e-1) unstable; urgency=medium
.
* Update to new upstream version 4.17.0+74-g3eac216e6e, which also contains
security fixes for the following issues: (Closes: #1033297)
- x86 shadow plus log-dirty mode use-after-free
XSA-427 CVE-2022-42332
- x86/HVM pinned cache attributes mis-handling
XSA-428 CVE-2022-42333 CVE-2022-42334
- x86: speculative vulnerability in 32bit SYSCALL path
XSA-429 CVE-2022-42331
Checksums-Sha1:
05d9cd74fa9166515ed9ff5b5a1220fddabd689e 4482 xen_4.17.0+74-g3eac216e6e-1.dsc
c64f1493de1dca4eda8eebb17abc087ddd233c59 4657056 xen_4.17.0+74-g3eac216e6e.orig.tar.xz
af8fd0ea63d68b0475c0adb484d20a369914268d 136676 xen_4.17.0+74-g3eac216e6e-1.debian.tar.xz
Checksums-Sha256:
80fab64a2ba48e1f008cd57f8d060de3f7028ceecbdf445324dc358d57984741 4482 xen_4.17.0+74-g3eac216e6e-1.dsc
6ffff48e2392ff2aa2749c638c30d9af8209397b856280969fa3b7e909852c38 4657056 xen_4.17.0+74-g3eac216e6e.orig.tar.xz
aebc1e8a3f206a19f87455968ce119dad749d99e2f2314c6ff7ada2812709d45 136676 xen_4.17.0+74-g3eac216e6e-1.debian.tar.xz
Files:
b235c29e6ee51d636eb3b950c633eabe 4482 admin optional xen_4.17.0+74-g3eac216e6e-1.dsc
b7fad65ca2a3480f635338373366542d 4657056 admin optional xen_4.17.0+74-g3eac216e6e.orig.tar.xz
c5494e12ae0208c6ab16a0b42ced4c99 136676 admin optional xen_4.17.0+74-g3eac216e6e-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=R2sr
-----END PGP SIGNATURE-----