[Pkg-xen-devel] xen_4.19.1-1_source.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Mon Dec 23 11:34:33 GMT 2024
Thank you for your contribution to Debian.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 21 Dec 2024 11:33:16 +0100
Source: xen
Architecture: source
Version: 4.19.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <hans at knorrie.org>
Closes: 989560 1029998 1036601 1073913 1089033 1089621
Changes:
xen (4.19.1-1) unstable; urgency=medium
.
* Upload to unstable (Closes: #1089033)
* Pick upstream commit e6472d46680c ("tools/xg: increase LZMA_BLOCK_SIZE for
uncompressing the kernel") to fix decompressing Linux 6.12 when starting
in PV mode.
* Note that the following XSA were not listed, because...
- XSA-465 has patches for the Linux kernel.
- XSA-466 contains a documentation update that was only applied to the
current development version of Xen
.
xen (4.19.1-1~exp4) experimental; urgency=medium
.
* Upload again, with binaries this time.
.
xen (4.19.1-1~exp3) experimental; urgency=medium
.
* d/copyright: Fix invalid "-present" copyright years. (Closes: #1089621)
.
xen (4.19.1-1~exp2) experimental; urgency=medium
.
* Drop support for armhf (Closes: #989560)
- src:xen now FTBFS on armhf because OCaml 5.x has no support for native
compilation on 32-bit systems any more.
- As seen in #989560, Xen on armhf was already dysfunctional for years
- The team does not have resources or knowledge to support the armhf build
.
[ Maximilian Engelhardt ]
.
* d/control: Add Maximilian Engelhardt to Uploaders
* d/copyright: Specify correct years for authors of debian/*
* debian: undo ABI-stable t64 package renaming
.
xen (4.19.1-1~exp1) experimental; urgency=medium
.
* Update to new upstream version 4.19.1, which also contains
security fixes for the following issues:
- x86: Deadlock in vlapic_error()
XSA-462 CVE-2024-45817
- Deadlock in x86 HVM standard VGA handling
XSA-463 CVE-2024-45818
- libxl leaks data to PVH guests via ACPI tables
XSA-464 CVE-2024-45819
* Fix compilation on arm64 and armhf with upstream commit ee826bc490
("Arm64: adjust __irq_to_desc() to fix build with gcc14")
.
xen (4.19.0+14-g0918434e0f-1~exp1) experimental; urgency=medium
.
Significant changes:
* Update to new upstream version 4.19.0+14-g0918434e0f, which also contains
security fixes for the following issues:
- x86: Register File Data Sampling
XSA-452 CVE-2023-28746
- GhostRace: Speculative Race Conditions
XSA-453 CVE-2024-2193
- x86 HVM hypercalls may trigger Xen bug check
XSA-454 CVE-2023-46842
- x86: Incorrect logic for BTC/SRSO mitigations
XSA-455 CVE-2024-31142
- x86: Native Branch History Injection
XSA-456 CVE-2024-2201
- double unlock in x86 guest IRQ handling
XSA-458 CVE-2024-31143
- error handling in x86 IOMMU identity mapping
XSA-460 CVE-2024-31145
- PCI device pass-through with shared resources
XSA-461 CVE-2024-31146
* Note that the following XSA are not listed, because...
- XSA-457 has patches for the Linux kernel.
- XSA-459 is within Xapi which is not shipped by this package.
* Fix compilation with OCaml 5.2.0 (Closes: #1073913)
.
Changes related to upgrading to Xen 4.19:
* debian/control: adjust to 4.19
* debian/copyright: update for xen 4.19
* Refresh remaining patches if needed
.
Packaging minor fixes and improvements:
* debian/control: remove old version constraints and cleanup
* debian/control: update Standards-Version to 4.7.0
* debian/control: add python3-setuptools dependency
* debian/rules: cleanup and improved comments
* debian/rules: enable parallel build
* debian/rules: move xenstore-control to xen-utils-common (Closes: #1036601)
* debian: ship systemd service files for xen and xendomains
(Closes: #1029998)
* docs/Makefile: Work around a reproducibility issue by generating
documentation for ppc and riscv architectures.
Checksums-Sha1:
179c6ef611c2d1a511f002d1ff624c7eb4d356ae 4052 xen_4.19.1-1.dsc
cd4224008743ae49e1468ed6ea8a20fefe18d3b6 140568 xen_4.19.1-1.debian.tar.xz
Checksums-Sha256:
2c41e486c4d27fe5a866f014dc9ac1af7c5f2a5be74545b421b3469945689352 4052 xen_4.19.1-1.dsc
34fae8347ddaa3f2a277f1aae5b5a335a79a28f57ab0e757edacc78607140357 140568 xen_4.19.1-1.debian.tar.xz
Files:
8bed5e8829570c4f3f1a4b460ea05dc0 4052 admin optional xen_4.19.1-1.dsc
b1fe28131bbdbf6ef45540cd420ff04f 140568 admin optional xen_4.19.1-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=mwqu
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 228 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20241223/95542e00/attachment.sig>
More information about the Pkg-xen-devel
mailing list