Accepted xen 4.17.2+76-ge1f9cb16e2-1~deb12u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted xen 4.17.2+76-ge1f9cb16e2-1~deb12u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 03 Dec 2023 12:32:14 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: xen_4.17.2+76-ge1f9cb16e2-1~deb12u1_source.changes
- Debian-source: xen
- Debian-suite: proposed-updates
- Debian-version: 4.17.2+76-ge1f9cb16e2-1~deb12u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=YtaVJVPkYiZTZd9lQzsbPb0CML4h1OY8ip+d/uLTLHQ=; b=dNTfrR6maMJVPgV8FK/XhrYVKG RODMBpM2tcnu541PTslNrfUj2hpbQCs69cX+jgYmtZpxpvN+bPi3CvSrYrTXgdoX5kHam2BSmKsMv Lpe6p1rViZ29YGoFFX7hByWTV+gj3pOiUL64ip0WhS9y/tCQ1uAJAjxO4radgD/oEgFhWFMHax/HO F7b/tU1EPeHo8t6JP77pbwTz3AQdOHIJG0Rso+ElqWMLU7lKNws8yR8iVlXK59tGuepDGZZImXx8x uFJ1b0cO9CavCM8Pvx1wmWSzNK3/M0D3NOtwBToVu9gCZQa5rET3boUmQR3dODt0bxen5JMXTNmhI KpOYYsbg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1r9ldu-007Mok-8M@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 02 Dec 2023 17:58:08 +0100
Source: xen
Architecture: source
Version: 4.17.2+76-ge1f9cb16e2-1~deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Maximilian Engelhardt <maxi@daemonizer.de>
Closes: 1042102 1056928
Changes:
xen (4.17.2+76-ge1f9cb16e2-1~deb12u1) bookworm; urgency=medium
.
* Rebuild for bookworm to address the security issues since
4.17.1+2-gb773c48e36-1 listed below.
* d/salsa-ci.yml: Set RELEASE variable to bookworm
.
xen (4.17.2+76-ge1f9cb16e2-1) unstable; urgency=medium
.
* Update to new upstream version 4.17.2-76-ge1f9cb16e2, which also contains
security fixes for the following issues: (Closes: #1056928)
- x86/AMD: mismatch in IOMMU quarantine page table levels
XSA-445 CVE-2023-46835
- x86: BTC/SRSO fixes not fully effective
XSA-446 CVE-2023-46836
.
xen (4.17.2+55-g0b56bed864-1) unstable; urgency=medium
.
* Update to new upstream version 4.17.2+55-g0b56bed864, which also contains
security fixes for the following issues:
- arm32: The cache may not be properly cleaned/invalidated
XSA-437 CVE-2023-34321
- top-level shadow reference dropped too early for 64-bit PV guests
XSA-438 CVE-2023-34322
- x86/AMD: Divide speculative information leak
XSA-439 CVE-2023-20588
- xenstored: A transaction conflict can crash C Xenstored
XSA-440 CVE-2023-34323
- x86/AMD: missing IOMMU TLB flushing
XSA-442 CVE-2023-34326
- Multiple vulnerabilities in libfsimage disk handling
XSA-443 CVE-2023-34325
- x86/AMD: Debug Mask handling
XSA-444 CVE-2023-34327 CVE-2023-34328
* Note that the following XSA are not listed, because...
- XSA-441 has patches for the Linux kernel.
.
xen (4.17.2-1) unstable; urgency=medium
.
* Update to new upstream version 4.17.2, which also contains
security fixes for the following issues: (Closes: #1042102)
- x86/AMD: Zenbleed
XSA-433 CVE-2023-20593
- x86/AMD: Speculative Return Stack Overflow
XSA-434 CVE-2023-20569
- x86/Intel: Gather Data Sampling
XSA-435 CVE-2022-40982
- arm: Guests can trigger a deadlock on Cortex-A77
XSA-436 CVE-2023-34320
* Note that the following XSA are not listed, because...
- XSA-432 has patches for the Linux kernel.
Checksums-Sha1:
d61e2bbfa98c38898a091711e48cffbe2fbdb467 4522 xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.dsc
fa5d46e9a5a506de7de24ee592f2e6c92221fa3b 136800 xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.debian.tar.xz
Checksums-Sha256:
da5ad079ffc53f0d87f701dece3cdf936c3fa8f3dfcd03a7b031bc5e7fe3b1ce 4522 xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.dsc
30d06e10eb6ad4b2758f02968db1d741669be6bc23b5cbaf828c075ec6a46445 136800 xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.debian.tar.xz
Files:
8bc5dc13ab2b089af17ccad33a08b8f5 4522 admin optional xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.dsc
c056b8eb8fcfb43d2fb5609b8e2064d4 136800 admin optional xen_4.17.2+76-ge1f9cb16e2-1~deb12u1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=XMKi
-----END PGP SIGNATURE-----