From: Raspbian automatic forward porter Date: Tue, 22 Nov 2022 09:16:06 +0000 (+0000) Subject: Merge version 4.16.2-1+rpi1 and 4.16.2+90-g0d39a6d1ae-1 to produce 4.16.2+90-g0d39a6d... X-Git-Tag: archive/raspbian/4.16.2+90-g0d39a6d1ae-1+rpi1^0 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=99bcf506cc3a7a4aaaa5fe156432fa00dbb1284c;p=xen.git Merge version 4.16.2-1+rpi1 and 4.16.2+90-g0d39a6d1ae-1 to produce 4.16.2+90-g0d39a6d1ae-1+rpi1 --- 99bcf506cc3a7a4aaaa5fe156432fa00dbb1284c diff --cc debian/changelog index 270f6fe803,2eb38e9f81..5363757c18 --- a/debian/changelog +++ b/debian/changelog @@@ -1,15 -1,51 +1,64 @@@ - xen (4.16.2-1+rpi1) bookworm-staging; urgency=medium ++xen (4.16.2+90-g0d39a6d1ae-1+rpi1) bookworm-staging; urgency=medium + + [changes brought forward from 4.4.1-9+rpi1 by Peter Michael Green at Sun, 30 Aug 2015 15:43:16 +0000] + * replace "dmb" with "mcr p15, #0, r0, c7, c10, #5" for armv6 + + [changes introduced in 4.6.0-1+rpi1 by Peter Michael Green] + * Use kernel 3.18 for now as I haven't dealt with 4.x yet. + + [changes introduced in 4.11.1+26-g87f51bf366-3+rpi1 by Peter Michael Green] + * Do not fail on files that are not installed. + - -- Raspbian forward porter Wed, 31 Aug 2022 05:49:28 +0000 ++ -- Raspbian forward porter Tue, 22 Nov 2022 09:16:06 +0000 ++ + xen (4.16.2+90-g0d39a6d1ae-1) unstable; urgency=medium + + * Update to new upstream version 4.16.2+90-g0d39a6d1ae, which also contains + security fixes for the following issues: + - Xenstore: guests can let run xenstored out of memory + XSA-326 CVE-2022-42311 CVE-2022-42312 CVE-2022-42313 CVE-2022-42314 + CVE-2022-42315 CVE-2022-42316 CVE-2022-42317 CVE-2022-42318 + - Arm: unbounded memory consumption for 2nd-level page tables + XSA-409 CVE-2022-33747 + - P2M pool freeing may take excessively long + XSA-410 CVE-2022-33746 + - lock order inversion in transitive grant copy handling + XSA-411 CVE-2022-33748 + - x86: unintended memory sharing between guests + XSA-412 CVE-2022-42327 + - Xenstore: Guests can crash xenstored + XSA-414 CVE-2022-42309 + - Xenstore: Guests can create orphaned Xenstore nodes + XSA-415 CVE-2022-42310 + - Xenstore: Guests can cause Xenstore to not free temporary memory + XSA-416 CVE-2022-42319 + - Xenstore: Guests can get access to Xenstore nodes of deleted domains + XSA-417 CVE-2022-42320 + - Xenstore: Guests can crash xenstored via exhausting the stack + XSA-418 CVE-2022-42321 + - Xenstore: Cooperating guests can create arbitrary numbers of nodes + XSA-419 CVE-2022-42322 CVE-2022-42323 + - Oxenstored 32->31 bit integer truncation issues + XSA-420 CVE-2022-42324 + - Xenstore: Guests can create arbitrary number of nodes via transactions + XSA-421 CVE-2022-42325 CVE-2022-42326 + - x86: Multiple speculative security issues + XSA-422 CVE-2022-23824 + * Note that the following XSA are not listed, because... + - XSA-413 applies to XAPI which is not included in Debian + * Drop the "x86/CPUID: surface suitable value in EBX of XSTATE subleaf 1" + patch again because it's included in upstream changes now. + + -- Hans van Kranenburg Wed, 16 Nov 2022 12:50:33 +0100 + + xen (4.16.2-2) unstable; urgency=medium + + * debian/control: Add libzstd-dev as Build-Depends + * Pick upstream commit c3bd0b83ea ("x86/CPUID: surface suitable value in EBX + of XSTATE subleaf 1") to fix compatibility with Linux 5.19. + (Closes: #1020787) + + -- Hans van Kranenburg Wed, 28 Sep 2022 19:03:14 +0200 xen (4.16.2-1) unstable; urgency=medium