Accepted xen 4.17.3+10-g091466ba55-1~deb12u1 (source) into proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted xen 4.17.3+10-g091466ba55-1~deb12u1 (source) into proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 04 Feb 2024 19:32:08 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: xen_4.17.3+10-g091466ba55-1~deb12u1_source.changes
- Debian-source: xen
- Debian-suite: proposed-updates
- Debian-version: 4.17.3+10-g091466ba55-1~deb12u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=2SS653xZwdc6hMpGfHptRSnWJOzes+LklpxDbxBPggo=; b=DCRURdgUNeMNx4nso/GxBBIbT9 Lhl5m7vNCT/dO2FhDFBEGKOxAOhJDj0JgvdPqzRVB9puLlrC+ctNxpeq9HrnAEel5c+9PEjhmdXq6 JBhIkvB3PENk8qV8HbGlIyCc+e8XcinO6OjS4EqEcXDR0sf6MatlV9iNllDpHMlPPOlbUkcr5X4Z1 Y4TtfkHqgTVlJLMpXOnn5Cig71J4Wv0pXPk2R5PDs3TtfKhMIYp+kxx3TXFdHJiu034zAwmNV/6Zn Ewb41cyGcFguxfv36Hj3ORMIvRl/0U7Y+QaEZA1V4gcjNqLwGqz6LFq/GGTuvrtDsQz4pjGcC1Wiy b/i4P9WQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1rWiDo-0060pW-Dq@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 04 Feb 2024 16:31:59 +0100
Source: xen
Architecture: source
Version: 4.17.3+10-g091466ba55-1~deb12u1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel@lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <hans@knorrie.org>
Closes: 1062048
Changes:
xen (4.17.3+10-g091466ba55-1~deb12u1) bookworm; urgency=medium
.
* Rebuild 4.17.3+10-g091466ba55-1 for Bookworm to address the security
issues since last Debian stable update.
.
xen (4.17.3+10-g091466ba55-1) unstable; urgency=medium
.
* Update to new upstream version 4.17.3+10-g091466ba55, which also contains
security fixes for the following issues:
- arm32: The cache may not be properly cleaned/invalidated (take two)
XSA-447 CVE-2023-46837
- pci: phantom functions assigned to incorrect contexts
XSA-449 CVE-2023-46839
- VT-d: Failure to quarantine devices in !HVM builds
XSA-450 CVE-2023-46840
* Note that the following XSA are not listed, because...
- XSA-448 has patches for the Linux kernel.
* Compilation with Python 3.12 has been fixed in upstream commit 4000522008
("Only compile the hypervisor with -Wdeclaration-after-statement")
(Closes: #1062048)
Checksums-Sha1:
6ad8ae4285eed88b886f7dae66810720d0480582 4522 xen_4.17.3+10-g091466ba55-1~deb12u1.dsc
84fd4e57d869a05346de71b0e704737179a23f60 137044 xen_4.17.3+10-g091466ba55-1~deb12u1.debian.tar.xz
Checksums-Sha256:
6c3dcea8ae88ebff52df32c8b7f6a4f0f2c833ea1de6351160d2efb823fd37f2 4522 xen_4.17.3+10-g091466ba55-1~deb12u1.dsc
742806c0e47f064f1eb15c720c6f34ec2ed6f72dff56416e697f5ca822844299 137044 xen_4.17.3+10-g091466ba55-1~deb12u1.debian.tar.xz
Files:
45e2d45eeb5bfa15448b61cfcdf69d6d 4522 admin optional xen_4.17.3+10-g091466ba55-1~deb12u1.dsc
e68c801b71e5864b50e4f285b2a81598 137044 admin optional xen_4.17.3+10-g091466ba55-1~deb12u1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=krNd
-----END PGP SIGNATURE-----