Your message dated Tue, 15 Dec 2020 12:35:04 +0000
with message-id <e1kp9xk-000bta...@fasolo.debian.org>
and subject line Bug#976109: fixed in xen 4.14.0+88-g1d1d1f5391-1
has caused the Debian Bug report #976109,
regarding xen: CVE-2020-29040
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
976109: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976109
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xen
Version: 4.14.0+80-gd101b417b7-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for xen.

CVE-2020-29040[0]:
| An issue was discovered in Xen through 4.14.x allowing x86 HVM guest
| OS users to cause a denial of service (stack corruption), cause a data
| leak, or possibly gain privileges because of an off-by-one error.
| NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-29040
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29040
[1] https://xenbits.xen.org/xsa/advisory-355.html

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.14.0+88-g1d1d1f5391-1
Done: Hans van Kranenburg <h...@knorrie.org>

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 976...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hans van Kranenburg <h...@knorrie.org> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 15 Dec 2020 13:00:00 +0100
Source: xen
Architecture: source
Version: 4.14.0+88-g1d1d1f5391-1
Distribution: unstable
Urgency: high
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <h...@knorrie.org>
Closes: 862408 942611 955994 976109
Changes:
 xen (4.14.0+88-g1d1d1f5391-1) unstable; urgency=high
 .
   * Update to new upstream version 4.14.0+88-g1d1d1f5391, which also contains
     security fixes for the following issues:
     - stack corruption from XSA-346 change
       XSA-355 CVE-2020-29040 (Closes: #976109)
   * Apply security fixes for the following issues:
     - oxenstored: permissions not checked on root node
       XSA-353 CVE-2020-29479
     - xenstore watch notifications lacking permission checks
       XSA-115 CVE-2020-29480
     - Xenstore: new domains inheriting existing node permissions
       XSA-322 CVE-2020-29481
     - Xenstore: wrong path length check
       XSA-323 CVE-2020-29482
     - Xenstore: guests can crash xenstored via watchs
       XSA-324 CVE-2020-29484
     - Xenstore: guests can disturb domain cleanup
       XSA-325 CVE-2020-29483
     - oxenstored memory leak in reset_watches
       XSA-330 CVE-2020-29485
     - oxenstored: node ownership can be changed by unprivileged clients
       XSA-352 CVE-2020-29486
     - undue recursion in x86 HVM context switch code
       XSA-348 CVE-2020-29566
     - infinite loop when cleaning up IRQ vectors
       XSA-356 CVE-2020-29567
     - FIFO event channels control block related ordering
       XSA-358 CVE-2020-29570
     - FIFO event channels control structure ordering
       XSA-359 CVE-2020-29571
   * Note that the following XSA are not listed, because...
     - XSA-349 and XSA-350 have patches for the Linux kernel
     - XSA-354 has patches for the XAPI toolstack
 .
   Packaging bugfixes and improvements:
   * d/rules: do not compress /usr/share/doc/xen/html (Closes: #942611)
   * Add missing CVE numbers to the previous changelog entries
 .
   Packaging bugfixes and improvements [Elliott Mitchell]:
   * d/shuffle-binaries: Make error detection/message overt
   * d/shuffle-binaries: Add quoting for potentially changeable variables
   * d/shuffle-boot-files: Add lots of double-quotes when handling variables
   * debian/rules: Set CC/LD to enable cross-building
   * debian/xen.init: Load xen_acpi_processor on boot
   * d/shuffle-binaries: Remove useless extra argument being passed in
 .
   Packaging bugfixes and improvements [Maximilian Engelhardt]:
   * d/xen-hypervisor-V-F.postinst.vsn-in: use reboot-required
     (Closes: #862408)
   * d/xen-hypervisor-V-F.postrm: actually install script
   * d/xen-hypervisor-V.*: clean up unused files
   * d/xen-hypervisor-V.bug-control.vsn-in: actually install script
   * debian/rules: enable verbose build
 .
   Fixes to patches for upstream code:
   * t/h/L/vif-common.sh: force handle_iptable return value to be 0
     (Closes: #955994)
 .
   * Pick the following upstream commits to improve Raspberry Pi 4 support,
     requested by Elliott Mitchell:
     - 25849c8b16 ("xen/rpi4: implement watchdog-based reset")
     - 17d192e023 ("tools/python: Pass linker to Python build process")
     - 861f0c1109 ("xen/arm: acpi: Don't fail if SPCR table is absent")
     - 1c4aa69ca1 ("xen/acpi: Rework acpi_os_map_memory() and
                    acpi_os_unmap_memory()")
     - 4d625ff3c3 ("xen/arm: acpi: The fixmap area should always be cleared
                    during failure/unmap")
     - dac867bf9a ("xen/arm: Check if the platform is not using ACPI before
                    initializing Dom0less")
     - 9c2bc0f24b ("xen/arm: Introduce fw_unreserved_regions() and use it")
     - 7056f2f89f ("xen/arm: acpi: add BAD_MADT_GICC_ENTRY() macro")
     - 957708c2d1 ("xen/arm: traps: Don't panic when receiving an unknown debug
                    trap")
 .
   * Pick upstream commit ba6e78f0db ("fix spelling errors"). Thanks, Diederik.
Checksums-Sha1:
 4528e850019803b8e228994332adaa7f716f9ee1 4243 xen_4.14.0+88-g1d1d1f5391-1.dsc
 ba92bc7cc6cdce971b7faf5a5b4feeeea5fc23ad 4356048 
xen_4.14.0+88-g1d1d1f5391.orig.tar.xz
 fcdbe0dbb8486f1297e4ac292b94f78701d213df 168580 
xen_4.14.0+88-g1d1d1f5391-1.debian.tar.xz
Checksums-Sha256:
 347d04d9afa4f4ea287e9cd9e3affde6191ef93b14b4e238464f5ada963de9d2 4243 
xen_4.14.0+88-g1d1d1f5391-1.dsc
 a872f5295d9b1de1d7867b1016a38eaf2ebbcfe0180e48d0a0a96bbdaf0accc5 4356048 
xen_4.14.0+88-g1d1d1f5391.orig.tar.xz
 43bc665ccf6159293917e7ece2d977f0e72cbc440a132aa79b800ad5e4a9c071 168580 
xen_4.14.0+88-g1d1d1f5391-1.debian.tar.xz
Files:
 9720b101e4611fe7dd7cd6769c536bb4 4243 admin optional 
xen_4.14.0+88-g1d1d1f5391-1.dsc
 0aba66cc2aface72955ddf7a6b6b9169 4356048 admin optional 
xen_4.14.0+88-g1d1d1f5391.orig.tar.xz
 ea5b20353f5a99b35b648cc11b8b13d0 168580 admin optional 
xen_4.14.0+88-g1d1d1f5391-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=FlmQ
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to