Debian FTP Masters
2024-Dec-23 11:34 UTC
[Pkg-xen-devel] xen_4.19.1-1_source.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sat, 21 Dec 2024 11:33:16 +0100 Source: xen Architecture: source Version: 4.19.1-1 Distribution: unstable Urgency: medium Maintainer: Debian Xen Team <pkg-xen-devel at lists.alioth.debian.org> Changed-By: Hans van Kranenburg <hans at knorrie.org> Closes: 989560 1029998 1036601 1073913 1089033 1089621 Changes: xen (4.19.1-1) unstable; urgency=medium . * Upload to unstable (Closes: #1089033) * Pick upstream commit e6472d46680c ("tools/xg: increase LZMA_BLOCK_SIZE for uncompressing the kernel") to fix decompressing Linux 6.12 when starting in PV mode. * Note that the following XSA were not listed, because... - XSA-465 has patches for the Linux kernel. - XSA-466 contains a documentation update that was only applied to the current development version of Xen . xen (4.19.1-1~exp4) experimental; urgency=medium . * Upload again, with binaries this time. . xen (4.19.1-1~exp3) experimental; urgency=medium . * d/copyright: Fix invalid "-present" copyright years. (Closes: #1089621) . xen (4.19.1-1~exp2) experimental; urgency=medium . * Drop support for armhf (Closes: #989560) - src:xen now FTBFS on armhf because OCaml 5.x has no support for native compilation on 32-bit systems any more. - As seen in #989560, Xen on armhf was already dysfunctional for years - The team does not have resources or knowledge to support the armhf build . [ Maximilian Engelhardt ] . * d/control: Add Maximilian Engelhardt to Uploaders * d/copyright: Specify correct years for authors of debian/* * debian: undo ABI-stable t64 package renaming . xen (4.19.1-1~exp1) experimental; urgency=medium . * Update to new upstream version 4.19.1, which also contains security fixes for the following issues: - x86: Deadlock in vlapic_error() XSA-462 CVE-2024-45817 - Deadlock in x86 HVM standard VGA handling XSA-463 CVE-2024-45818 - libxl leaks data to PVH guests via ACPI tables XSA-464 CVE-2024-45819 * Fix compilation on arm64 and armhf with upstream commit ee826bc490 ("Arm64: adjust __irq_to_desc() to fix build with gcc14") . xen (4.19.0+14-g0918434e0f-1~exp1) experimental; urgency=medium . Significant changes: * Update to new upstream version 4.19.0+14-g0918434e0f, which also contains security fixes for the following issues: - x86: Register File Data Sampling XSA-452 CVE-2023-28746 - GhostRace: Speculative Race Conditions XSA-453 CVE-2024-2193 - x86 HVM hypercalls may trigger Xen bug check XSA-454 CVE-2023-46842 - x86: Incorrect logic for BTC/SRSO mitigations XSA-455 CVE-2024-31142 - x86: Native Branch History Injection XSA-456 CVE-2024-2201 - double unlock in x86 guest IRQ handling XSA-458 CVE-2024-31143 - error handling in x86 IOMMU identity mapping XSA-460 CVE-2024-31145 - PCI device pass-through with shared resources XSA-461 CVE-2024-31146 * Note that the following XSA are not listed, because... - XSA-457 has patches for the Linux kernel. - XSA-459 is within Xapi which is not shipped by this package. * Fix compilation with OCaml 5.2.0 (Closes: #1073913) . Changes related to upgrading to Xen 4.19: * debian/control: adjust to 4.19 * debian/copyright: update for xen 4.19 * Refresh remaining patches if needed . Packaging minor fixes and improvements: * debian/control: remove old version constraints and cleanup * debian/control: update Standards-Version to 4.7.0 * debian/control: add python3-setuptools dependency * debian/rules: cleanup and improved comments * debian/rules: enable parallel build * debian/rules: move xenstore-control to xen-utils-common (Closes: #1036601) * debian: ship systemd service files for xen and xendomains (Closes: #1029998) * docs/Makefile: Work around a reproducibility issue by generating documentation for ppc and riscv architectures. Checksums-Sha1: 179c6ef611c2d1a511f002d1ff624c7eb4d356ae 4052 xen_4.19.1-1.dsc cd4224008743ae49e1468ed6ea8a20fefe18d3b6 140568 xen_4.19.1-1.debian.tar.xz Checksums-Sha256: 2c41e486c4d27fe5a866f014dc9ac1af7c5f2a5be74545b421b3469945689352 4052 xen_4.19.1-1.dsc 34fae8347ddaa3f2a277f1aae5b5a335a79a28f57ab0e757edacc78607140357 140568 xen_4.19.1-1.debian.tar.xz Files: 8bed5e8829570c4f3f1a4b460ea05dc0 4052 admin optional xen_4.19.1-1.dsc b1fe28131bbdbf6ef45540cd420ff04f 140568 admin optional xen_4.19.1-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEESWyddwNaG9637koYssHfcmNhX2wFAmdpRz4ACgkQssHfcmNh X2xOAw//dN73ls3WVMSRFSfBxwM0Nf2twnCY5VTFUh9NFESDcIewkExfD0O0aNfw 9hbA5oBEY0a8Urk+kFX8TCm0unQtPH72WunIOu7eaNhS40SQ6y9XnqAoSikeaQV0 UVNyd4TUKhyROjA9viorbOKNRMcx49l6DzEu18W1Ghsd28L72M77hN7aSRYspwGO IROIoCIRJBJEnOa12AN2lQHXg2wQdjsTe31ZwSdWPIu9w3rGK2AxUXoQ1azlobDS h1ttClA1bz3cr6jCXNHNSQF8eW593eUog/yejW3Cv8B+RlHKT3wbpg6qw8tNuLuN nEp2Y9H9BPE0vyEWvJJjdZCqdIdDR4/gqrfvq7CBAoErx52Qn953KOCK2ofaDWAE /QUWXu8hFAFFu/NwaQKupWhqzpn7QFlhKQNCNLGAqLCtRx10XN70z6EWzpKeG3XG zlU1OYHWFIoR6wpWbEzZezrMLvsSXowdamTZYFp/x/2bOoChZN9KFUN6Av0sSyDl eUCptNl+2mVXu8G5f0jwp5PlHU3jnHAYUXcW8pyjsWPx6EipwG1UKs7RUx1Q2l06 xGr4qx666yFtleD0Bo0fjzbe04Hb347J0OzV+A+YJq2XjWsox7b5fJ6USczRQWdx XB9CtVnhRotZZ4cQR61zN75bG/UfSzhdEIkQ9+G8VTmdwbMpxZ8=mwqu -----END PGP SIGNATURE----- -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 228 bytes Desc: not available URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20241223/95542e00/attachment.sig>