Accepted xen 4.14.6-1 (source) into oldstable-proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted xen 4.14.6-1 (source) into oldstable-proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Fri, 29 Sep 2023 19:17:34 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: xen_4.14.6-1_source.changes
- Debian-source: xen
- Debian-suite: oldstable-proposed-updates
- Debian-version: 4.14.6-1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=N5Y48N04hOhNw6qNIkjy7tMFvRWr4l5IVANLQH+u49o=; b=mJzxBJab0POI6KZg+ykgBAR2lg 29t4ViUwgoDT6QZx9TixNLxeDuCy26VdeSWGz3uqiuVqNkumHbv3ZUk1bZSlukx9Gn8Lbp4tQ3VCQ oTIjHzjPBMJ9rkXPgKejYH0yzUEDCrkQfWVSye+An0t224K6ILKlLkzkcMryUZkn4l/z1qGT85wBc 7ZsX1VXbFkS9vhKx8q9rnZHr3yQLjglRscOvH979+LzN8L4QCbzH5IzfH83Da4Q3/5pEMcuZh90tk Z3VFA245o3ZbIYibRfRpXqhXZFfUtyfAsT2s4oC02hyL4mYV05e5BJ43NrS8gH2L4THioEFFKLHEK 7RJRwCXA==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1qmIzW-0060Zz-IO@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 21 Sep 2023 16:55:59 +0200
Source: xen
Architecture: source
Version: 4.14.6-1
Distribution: bullseye
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <hans@knorrie.org>
Changes:
xen (4.14.6-1) bullseye; urgency=medium
.
* Update to new upstream version 4.14.6, which also contains
security fixes for the following issues:
- x86/AMD: Zenbleed
XSA-433 CVE-2023-20593
- x86/AMD: Speculative Return Stack Overflow
XSA-434 CVE-2023-20569
- x86/Intel: Gather Data Sampling
XSA-435 CVE-2022-40982
* Note that the following XSA are not listed, because...
- XSA-430 and XSA-431 only apply to Xen 4.17
- XSA-432 has patches for the Linux kernel.
* Also, note that upstream security support for Xen 4.14 has ended with this
release. This also means that Xen security support for Debian Bullseye has
ended.
Checksums-Sha1:
ca9ed231cfee406358d274f81b1a1b731245e454 4129 xen_4.14.6-1.dsc
526a98bac4ce7958fb826cbed19db54e80226640 4404504 xen_4.14.6.orig.tar.xz
32226d14c922ed09af6d3dc5234f69b262d01972 143996 xen_4.14.6-1.debian.tar.xz
Checksums-Sha256:
d107753a9d81832aac0e3494e44d2b0e39ac14c764226ee1de63a4bbce1002f5 4129 xen_4.14.6-1.dsc
6365e5435b9a18dbce3433ec27e5409d2b1a421d5f6aacfb06833f15d3d9aedd 4404504 xen_4.14.6.orig.tar.xz
67150e71676b000cec4edd03a92afb5ea1acb140aac8aa3407f457d25a9b081b 143996 xen_4.14.6-1.debian.tar.xz
Files:
8957b26bfb4a3d85792b34464e133404 4129 admin optional xen_4.14.6-1.dsc
1465468783643e9572cb172cc19e91de 4404504 admin optional xen_4.14.6.orig.tar.xz
1981ea46f87d11178382970aee9dd8f4 143996 admin optional xen_4.14.6-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=UOp4
-----END PGP SIGNATURE-----