[Pkg-xen-devel] xen_4.16.2+90-g0d39a6d1ae-1_source.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed Nov 16 13:22:51 GMT 2022



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 16 Nov 2022 12:50:33 +0100
Source: xen
Architecture: source
Version: 4.16.2+90-g0d39a6d1ae-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <hans at knorrie.org>
Changes:
 xen (4.16.2+90-g0d39a6d1ae-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.16.2+90-g0d39a6d1ae, which also contains
     security fixes for the following issues:
      - Xenstore: guests can let run xenstored out of memory
        XSA-326 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314
        CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318
      - Arm: unbounded memory consumption for 2nd-level page tables
        XSA-409 CVE-2022-33747
      - P2M pool freeing may take excessively long
        XSA-410 CVE-2022-33746
      - lock order inversion in transitive grant copy handling
        XSA-411 CVE-2022-33748
      - x86: unintended memory sharing between guests
        XSA-412 CVE-2022-42327
      - Xenstore: Guests can crash xenstored
        XSA-414 CVE-2022-42309
      - Xenstore: Guests can create orphaned Xenstore nodes
        XSA-415 CVE-2022-42310
      - Xenstore: Guests can cause Xenstore to not free temporary memory
        XSA-416 CVE-2022-42319
      - Xenstore: Guests can get access to Xenstore nodes of deleted domains
        XSA-417 CVE-2022-42320
      - Xenstore: Guests can crash xenstored via exhausting the stack
        XSA-418 CVE-2022-42321
      - Xenstore: Cooperating guests can create arbitrary numbers of nodes
        XSA-419 CVE-2022-42322 CVE-2022-42323
      - Oxenstored 32->31 bit integer truncation issues
        XSA-420 CVE-2022-42324
      - Xenstore: Guests can create arbitrary number of nodes via transactions
        XSA-421 CVE-2022-42325 CVE-2022-42326
      - x86: Multiple speculative security issues
        XSA-422 CVE-2022-23824
    * Note that the following XSA are not listed, because...
      - XSA-413 applies to XAPI which is not included in Debian
    * Drop the "x86/CPUID: surface suitable value in EBX of XSTATE subleaf 1"
      patch again because it's included in upstream changes now.
Checksums-Sha1:
 98c58645c2743ce9918303296e83fff2ebbe7190 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc
 3953c243b347c0278588da55764087d1c34589ba 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
 e163089685aa9ac252f4084f08c60ba614e9228f 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz
Checksums-Sha256:
 584de011263c53fb724bd57b7a468a38d210569a91a8a0ce6fcba614c436516c 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc
 86ee16efa5745145b5a9712b38fb84f80d1d811a7f034342749eddd2a396a91d 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
 3a901188068a0059a81f7e2c2f680b07267774b2860f90125a9e623e12bc6bbf 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz
Files:
 7900eba5f374ee35eff9f0bfefe0110d 4156 admin optional xen_4.16.2+90-g0d39a6d1ae-1.dsc
 28922c06f0daf28512f86cc747d26aeb 4570012 admin optional xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
 d4c1b8a5c5628f96aac8e0ea83adefc7 131620 admin optional xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=t9Ji
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-xen-devel mailing list