Displaying 20 results from an estimated 400 matches similar to: "Bug#1056928: xen: CVE-2023-46835 CVE-2023-46836"
2023 Mar 21
2
Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
Source: xen
Version: 4.17.0+46-gaaf74a532c-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerabilities were published for xen.
CVE-2022-42331[0]:
| x86: speculative vulnerability in 32bit SYSCALL path Due to an
| oversight in the very original Spectre/Meltdown security work
| (XSA-254),
2023 Jan 28
1
Bug#1029830: xen: CVE-2022-42330
Source: xen
Version: 4.17.0-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerability was published for xen.
CVE-2022-42330[0]:
| Guests can cause Xenstore crash via soft reset When a guest issues a
| "Soft Reset" (e.g. for performing a kexec) the libxl based Xen
|
2023 Feb 18
1
Bug#1031567: xen: CVE-2022-27672: XSA-426: x86: Cross-Thread Return Address Predictions
Source: xen
Version: 4.17.0+24-g2f8851c37f-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerability was published for xen, filling with RC
severity (for ideally fixed before bookworm release):
CVE-2022-27672[0]:
| When SMT is enabled, certain AMD processors may speculatively execute
|
2023 Dec 05
0
xen 4.17.2+76-ge1f9cb16e2-1 MIGRATED to testing
FYI: The status of the xen source package
in Debian's testing distribution has changed.
Previous version: 4.17.2+55-g0b56bed864-1
Current version: 4.17.2+76-ge1f9cb16e2-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will receive
later changes on the next day.
See
2020 Jun 16
0
Fix build error with GCC 10 due to multiple definition of `toplevel'
Hi
When building with GCC 10, gcc is stricter in handling handling of
symbol clashes.
Fedora, has fixed this with a patch from Dominik Mierzejewski:
https://src.fedoraproject.org/rpms/tftp/c/5e2aa55b6802a52ef480d688b3ae4751220f20e0.patch
Attaching the corresponding patch for git am.
Regards,
Salvatore
>From 9e7641bf58df9dda3bc51f381f371fa7cbce47af Mon Sep 17 00:00:00 2001
From: Salvatore
2020 Sep 29
0
[PATCH RESEND] tftp-hpa: Fix build error with GCC 10 due to multiple definition of `toplevel'
Hi
When building with GCC 10, gcc is stricter in handling handling of
symbol clashes.
Fedora, has fixed this with a patch from Dominik Mierzejewski:
https://src.fedoraproject.org/rpms/tftp/c/5e2aa55b6802a52ef480d688b3ae4751220f20e0.patch
Attaching the corresponding patch for git am.
I'm sending the patch which was submitted a while ago to the list. Is
there something you wanted to be
2016 Apr 21
0
xen_4.4.1-9+deb8u5_allonly.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 19 Apr 2016 20:42:09 +0200
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture:
2016 Apr 22
0
xen_4.4.1-9+deb8u5_allonly.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 19 Apr 2016 20:42:09 +0200
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture: all source
Version: 4.4.1-9+deb8u5
2015 Nov 02
0
xen_4.4.1-9+deb8u2_multi.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 31 Oct 2015 06:53:56 +0100
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture:
2015 Nov 03
0
xen_4.4.1-9+deb8u2_multi.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 31 Oct 2015 06:53:56 +0100
Source: xen
Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf
Architecture: all source
Version: 4.4.1-9+deb8u2
2020 Nov 15
1
[PATCH] drm/nouveau: bail out of nouveau_channel_new if channel init fails
On Sun, Nov 15, 2020 at 6:43 PM Salvatore Bonaccorso <carnil at debian.org> wrote:
>
> Hi,
>
> On Fri, Aug 28, 2020 at 11:28:46AM +0200, Frantisek Hrbata wrote:
> > Unprivileged user can crash kernel by using DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC
> > ioctl. This was reported by trinity[1] fuzzer.
> >
> > [ 71.073906] nouveau 0000:01:00.0: crashme[1329]:
2015 Nov 02
0
xen_4.1.4-3+deb7u9_amd64.changes ACCEPTED into oldstable-proposed-updates->oldstable-new
Mapping oldstable-security to oldstable-proposed-updates.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 31 Oct 2015 07:08:27 +0100
Source: xen
Binary: xen-docs-4.1 libxen-4.1 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.1 xen-hypervisor-4.1-amd64 xen-system-amd64 xen-hypervisor-4.1-i386 xen-system-i386
2015 Nov 05
0
xen_4.1.4-3+deb7u9_amd64.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 31 Oct 2015 07:08:27 +0100
Source: xen
Binary: xen-docs-4.1 libxen-4.1 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.1 xen-hypervisor-4.1-amd64 xen-system-amd64 xen-hypervisor-4.1-i386 xen-system-i386
Architecture: source all amd64
Version: 4.1.4-3+deb7u9
2017 Apr 04
4
Bug#859560: xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212)
Source: xen
Version: 4.8.1~pre.2017.01.23-1
Severity: grave
Tags: security upstream
Justification: user security hole
Hi,
the following vulnerability was published for xen.
CVE-2017-7228[0]:
| An issue (known as XSA-212) was discovered in Xen, with fixes available
| for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix
| introduced an insufficient check on XENMEM_exchange input,
2015 Jan 26
0
Processed: user debian-security@lists.debian.org, usertagging 776319, tagging 776319 ...
Processing commands for control at bugs.debian.org:
> user debian-security at lists.debian.org
Setting user to debian-security at lists.debian.org (was carnil at debian.org).
> usertags 776319 + tracked
There were no usertags set.
Usertags are now: tracked.
> tags 776319 + upstream fixed-upstream
Bug #776319 [src:xen] CVE-2015-0361
Added tag(s) upstream and fixed-upstream.
> retitle
2010 Feb 25
1
Updating a hexbinplot
Dear all,
Considering this simple example of hexbinplot:
mixdata <-
data.frame(x = c(rnorm(5000), rnorm(5000,4,1.5)),
y = c(rnorm(5000), rnorm(5000,2,3)),
a = gl(2, 5000))
fig <- hexbinplot(y ~ x | a, mixdata)
print(fig)
update(fig, colramp = BTC)
produces a bad (non-updated) legend. Compare it with:
hexbinplot(y ~ x | a, mixdata, colramp = BTC)
What
2015 Sep 27
1
Bug#800128: xen: CVE-2015-6654: printk is not rate-limited in xenmem_add_to_physmap_one
Source: xen
Version: 4.4.1-9
Severity: normal
Tags: security upstream patch fixed-upstream
Hi,
the following vulnerability was published for xen.
CVE-2015-6654[0]:
| The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x,
| 4.4.x, and earlier does not limit the number of printk console
| messages when reporting a failure to retrieve a reference on a foreign
| page, which allows
2013 Sep 06
1
Bug#721999: xen: FTBFS: dpkg-shlibdeps: error: couldn't find library libxenstore.so.3.0 needed by debian/libxen-4.3/usr/lib/libxenlight-4.3.so (ELF format: 'elf32-i386'; RPATH: '/usr/lib')
Source: xen
Version: 4.3.0-1
Severity: serious
Justification: FTBFS
Hi
New uploaded xen 4.3.0-1 FTBFS, see [1] for build log for i386.
[1] https://buildd.debian.org/status/fetch.php?pkg=xen&arch=i386&ver=4.3.0-1&stamp=1378426577
Regards,
Salvatore
2013 May 21
0
ALERT! /dev/xvda2 does not exist. Dropping to a shell!
Dear All,
Can''t start system because kernel can''t load file systems to and get the
next error:
modprobe: can''t load module microcode
(kernel/arch/x86/kernel/microcode.ko): No such device
done.
Begin: Running /scripts/init-premount ... Begin: Requesting microcode
update using per-core interface ... done.
done.
Begin: Mounting root file system ... Begin: Running
2013 Jun 01
0
Asic-technologies.com
Asic-technologies.com
We make ASIC Bitcoin Mining Gear using the ASIC chips Sourced from Taiwan.
3.1 -3.3 GHash/sec 4 Board (has 32 chips) - 15 BTC
9.3-9.9 GHash/sec 12 Board (has 96 chips) - 30 BTC
Each module board uses about 39 Watts of power.
Mining board's supplied (No case) power supply , On-board heat sink , USB connectors.
Ready assembled
(suggest that you insert board's into a