xen 4.11.4+24-gddaaccbbab-1 source package in Debian

Changelog

xen (4.11.4+24-gddaaccbbab-1) unstable; urgency=medium

  * Update to new upstream version 4.11.4+24-gddaaccbbab, which also contains
    security fixes for the following issues:
    - inverted code paths in x86 dirty VRAM tracking
      XSA-319 CVE-2020-15563
    - Special Register Buffer speculative side channel
      XSA-320 CVE-2020-0543
      N.B: To mitigate this issue, new cpu microcode is required. The changes
      in Xen provide a workaround for affected hardware that is not receiving
      a vendor microcode update. Please refer to the upstream XSA-320 Advisory
      text for more details.
    - insufficient cache write-back under VT-d
      XSA-321 CVE-2020-15565
    - Missing alignment check in VCPUOP_register_vcpu_info
      XSA-327 CVE-2020-15564
    - non-atomic modification of live EPT PTE
      XSA-328 CVE-2020-15567

 -- Hans van Kranenburg <email address hidden>  Tue, 07 Jul 2020 16:07:39 +0200

Upload details

Uploaded by:
Debian Xen Team
Uploaded to:
Sid
Original maintainer:
Debian Xen Team
Architectures:
amd64 arm64 armhf i386 all
Section:
kernel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
xen_4.11.4+24-gddaaccbbab-1.dsc 4.1 KiB c4844be6ec9bdb96c90f503825980c15d1e41cba3e631c450dce65cb5f629ba4
xen_4.11.4+24-gddaaccbbab.orig.tar.xz 4.1 MiB 9341af7e6509b16c6f5c1e400974a1fb6ec6d6d23b28c278e84ea17b4d3e3611
xen_4.11.4+24-gddaaccbbab-1.debian.tar.xz 131.1 KiB 001686853d09e13699658efb0c78d52030127a2bf434ae39e63504532c8da466

No changes file available.

Binary packages built by this source