[Pkg-xen-devel] xen_4.16.2+90-g0d39a6d1ae-1_source.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Wed Nov 16 13:22:51 GMT 2022
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 16 Nov 2022 12:50:33 +0100
Source: xen
Architecture: source
Version: 4.16.2+90-g0d39a6d1ae-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <hans at knorrie.org>
Changes:
xen (4.16.2+90-g0d39a6d1ae-1) unstable; urgency=medium
.
* Update to new upstream version 4.16.2+90-g0d39a6d1ae, which also contains
security fixes for the following issues:
- Xenstore: guests can let run xenstored out of memory
XSA-326 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314
CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318
- Arm: unbounded memory consumption for 2nd-level page tables
XSA-409 CVE-2022-33747
- P2M pool freeing may take excessively long
XSA-410 CVE-2022-33746
- lock order inversion in transitive grant copy handling
XSA-411 CVE-2022-33748
- x86: unintended memory sharing between guests
XSA-412 CVE-2022-42327
- Xenstore: Guests can crash xenstored
XSA-414 CVE-2022-42309
- Xenstore: Guests can create orphaned Xenstore nodes
XSA-415 CVE-2022-42310
- Xenstore: Guests can cause Xenstore to not free temporary memory
XSA-416 CVE-2022-42319
- Xenstore: Guests can get access to Xenstore nodes of deleted domains
XSA-417 CVE-2022-42320
- Xenstore: Guests can crash xenstored via exhausting the stack
XSA-418 CVE-2022-42321
- Xenstore: Cooperating guests can create arbitrary numbers of nodes
XSA-419 CVE-2022-42322 CVE-2022-42323
- Oxenstored 32->31 bit integer truncation issues
XSA-420 CVE-2022-42324
- Xenstore: Guests can create arbitrary number of nodes via transactions
XSA-421 CVE-2022-42325 CVE-2022-42326
- x86: Multiple speculative security issues
XSA-422 CVE-2022-23824
* Note that the following XSA are not listed, because...
- XSA-413 applies to XAPI which is not included in Debian
* Drop the "x86/CPUID: surface suitable value in EBX of XSTATE subleaf 1"
patch again because it's included in upstream changes now.
Checksums-Sha1:
98c58645c2743ce9918303296e83fff2ebbe7190 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc
3953c243b347c0278588da55764087d1c34589ba 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
e163089685aa9ac252f4084f08c60ba614e9228f 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz
Checksums-Sha256:
584de011263c53fb724bd57b7a468a38d210569a91a8a0ce6fcba614c436516c 4156 xen_4.16.2+90-g0d39a6d1ae-1.dsc
86ee16efa5745145b5a9712b38fb84f80d1d811a7f034342749eddd2a396a91d 4570012 xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
3a901188068a0059a81f7e2c2f680b07267774b2860f90125a9e623e12bc6bbf 131620 xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz
Files:
7900eba5f374ee35eff9f0bfefe0110d 4156 admin optional xen_4.16.2+90-g0d39a6d1ae-1.dsc
28922c06f0daf28512f86cc747d26aeb 4570012 admin optional xen_4.16.2+90-g0d39a6d1ae.orig.tar.xz
d4c1b8a5c5628f96aac8e0ea83adefc7 131620 admin optional xen_4.16.2+90-g0d39a6d1ae-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=t9Ji
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the Pkg-xen-devel
mailing list