Your message dated Sun, 28 Feb 2021 20:37:30 +0000
with message-id <[email protected]>
and subject line Bug#981052: fixed in xen 4.14.1+11-gb0b734a8b3-1
has caused the Debian Bug report #981052,
regarding xen: CVE-2021-3308: XSA-360: IRQ vector leak on x86
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
981052: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: xen
Version: 4.14.0+88-g1d1d1f5391-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi

For details see https://xenbits.xen.org/xsa/advisory-360.html . 

It does not affect version in buster afaict.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.14.1+11-gb0b734a8b3-1
Done: Hans van Kranenburg <[email protected]>

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hans van Kranenburg <[email protected]> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 28 Feb 2021 19:49:45 +0100
Source: xen
Architecture: source
Version: 4.14.1+11-gb0b734a8b3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <[email protected]>
Changed-By: Hans van Kranenburg <[email protected]>
Closes: 981052
Changes:
 xen (4.14.1+11-gb0b734a8b3-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.14.1+11-gb0b734a8b3, which also contains
     security fixes for the following issues:
     - IRQ vector leak on x86
       XSA-360 CVE-2021-3308  (Closes: #981052)
     - arm: The cache may not be cleaned for newly allocated scrubbed pages
       XSA-364 CVE-2021-26933
   * Drop separate patches for XSAs up to 359 that are now included in the
     upstream stable branch.
 .
   Packaging bugfixes and improvements [Elliott Mitchell]:
   * debian/rules: Set CC/LD to enable cross-building
   * d/shuffle-binaries: Fix binary shuffling script for cross-building
   * Rework "debian/rules: Do not try to move EFI binaries on armhf"
   * debian/scripts: Optimize runtime scripts
   * debian/xen-utils-common.examples: Remove xm examples
   * d/shuffle-boot-files: make it POSIX compliant  [Hans van Kranenburg, based
     on a patch by Elliott Mitchell]
   * d/shuffle-binaries: Switch loop from for to while
   * d/shuffle-binaries: Switch to POSIX shell, instead of Bash
   * d/shuffle-boot-files: Switch to POSIX shell, instead of Bash
   * debian/xendomains.init: Pipe xen-init-list instead of tmp file
 .
   Make the package build reproducibly [Maximilian Engelhardt]:
   * debian/salsa-ci.yml: enable salsa-ci
   * debian/salsa-ci.yml: enable diffoscope in reprotest
   * debian/rules: use SOURCE_DATE_EPOCH for xen build dates
   * debian/rules: don't include build path in binaries
   * debian/rules: reproducibly build oxenstored
   * Pick the following upstream commits:
     - 5816d327e4 ("xen: don't have timestamp inserted in config.gz")
     - ee41b5c450 ("x86/EFI: don't insert timestamp when SOURCE_DATE_EPOCH is
                    defined")
     - e18dadc5b7 ("docs: use predictable ordering in generated documentation")
   * Include upstream patch that is not committed yet, but needed:
     - docs: set date to SOURCE_DATE_EPOCH if available
   * debian/salsa-ci.yml: don't allow reprotest to fail
 .
   Packaging bugfixes and improvements:
   * d/shuffle-boot-files: Document more inner workings
Checksums-Sha1:
 da4ea00fa29d4bcf137d3a5ecb85fe94a3dbe180 4249 xen_4.14.1+11-gb0b734a8b3-1.dsc
 5c95dd53bcd786bd54b6a91ad3f2eab1a27d8647 4359020 
xen_4.14.1+11-gb0b734a8b3.orig.tar.xz
 ea72610b7443b9a008d09452e8d4256827d6ef83 138900 
xen_4.14.1+11-gb0b734a8b3-1.debian.tar.xz
Checksums-Sha256:
 ac953c84fc10557e1b9b26a5a46ae0a26c7344fd2705aef366fe8057cb94ec00 4249 
xen_4.14.1+11-gb0b734a8b3-1.dsc
 beb49c6d4d436dc74a694ff43cc016b25cad95d9e4f2e4b75683dbb330799dc1 4359020 
xen_4.14.1+11-gb0b734a8b3.orig.tar.xz
 a75209ac42bcbea9a1acf3a6e471cbd4069cce7a312ea43470ca6a72af7c8aa1 138900 
xen_4.14.1+11-gb0b734a8b3-1.debian.tar.xz
Files:
 1a514064f3001814c8acd422cbfb7505 4249 admin optional 
xen_4.14.1+11-gb0b734a8b3-1.dsc
 c783a4d92b7fae91f3c6a4cdd93ac5d9 4359020 admin optional 
xen_4.14.1+11-gb0b734a8b3.orig.tar.xz
 a7ae32874e584094d425c400e88124e8 138900 admin optional 
xen_4.14.1+11-gb0b734a8b3-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Oc2F
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to