Your message dated Wed, 29 Mar 2023 07:32:14 +0000
with message-id <e1phqi2-000q0s...@fasolo.debian.org>
and subject line Bug#1033297: fixed in xen 4.14.5+94-ge49571868d-1
has caused the Debian Bug report #1033297,
regarding xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1033297: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xen
Version: 4.17.0+46-gaaf74a532c-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for xen.

CVE-2022-42331[0]:
| x86: speculative vulnerability in 32bit SYSCALL path Due to an
| oversight in the very original Spectre/Meltdown security work
| (XSA-254), one entrypath performs its speculation-safety actions too
| late. In some configurations, there is an unprotected RET instruction
| which can be attacked with a variety of speculative attacks.


CVE-2022-42332[1]:
| x86 shadow plus log-dirty mode use-after-free In environments where
| host assisted address translation is necessary but Hardware Assisted
| Paging (HAP) is unavailable, Xen will run guests in so called shadow
| mode. Shadow mode maintains a pool of memory used for both shadow page
| tables as well as auxiliary data structures. To migrate or snapshot
| guests, Xen additionally runs them in so called log-dirty mode. The
| data structures needed by the log-dirty tracking are part of
| aformentioned auxiliary data. In order to keep error handling efforts
| within reasonable bounds, for operations which may require memory
| allocations shadow mode logic ensures up front that enough memory is
| available for the worst case requirements. Unfortunately, while page
| table memory is properly accounted for on the code path requiring the
| potential establishing of new shadows, demands by the log-dirty
| infrastructure were not taken into consideration. As a result, just
| established shadow page tables could be freed again immediately, while
| other code is still accessing them on the assumption that they would
| remain allocated.


CVE-2022-42333[2]:
| x86/HVM pinned cache attributes mis-handling T[his CNA information
| record relates to multiple CVEs; the text explains which
| aspects/vulnerabilities correspond to which CVE.] To allow cachability
| control for HVM guests with passed through devices, an interface
| exists to explicitly override defaults which would otherwise be put in
| place. While not exposed to the affected guests themselves, the
| interface specifically exists for domains controlling such guests.
| This interface may therefore be used by not fully privileged entities,
| e.g. qemu running deprivileged in Dom0 or qemu running in a so called
| stub-domain. With this exposure it is an issue that - the number of
| the such controlled regions was unbounded (CVE-2022-42333), -
| installation and removal of such regions was not properly serialized
| (CVE-2022-42334).


CVE-2022-42334[3]:
| x86/HVM pinned cache attributes mis-handling T[his CNA information
| record relates to multiple CVEs; the text explains which
| aspects/vulnerabilities correspond to which CVE.] To allow cachability
| control for HVM guests with passed through devices, an interface
| exists to explicitly override defaults which would otherwise be put in
| place. While not exposed to the affected guests themselves, the
| interface specifically exists for domains controlling such guests.
| This interface may therefore be used by not fully privileged entities,
| e.g. qemu running deprivileged in Dom0 or qemu running in a so called
| stub-domain. With this exposure it is an issue that - the number of
| the such controlled regions was unbounded (CVE-2022-42333), -
| installation and removal of such regions was not properly serialized
| (CVE-2022-42334).


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-42331
    https://www.cve.org/CVERecord?id=CVE-2022-42331
[1] https://security-tracker.debian.org/tracker/CVE-2022-42332
    https://www.cve.org/CVERecord?id=CVE-2022-42332
[2] https://security-tracker.debian.org/tracker/CVE-2022-42333
    https://www.cve.org/CVERecord?id=CVE-2022-42333
[3] https://security-tracker.debian.org/tracker/CVE-2022-42334
    https://www.cve.org/CVERecord?id=CVE-2022-42334

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.14.5+94-ge49571868d-1
Done: Maximilian Engelhardt <m...@daemonizer.de>

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Maximilian Engelhardt <m...@daemonizer.de> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 23 Mar 2023 20:40:49 +0100
Source: xen
Binary: libxen-dev libxencall1 libxencall1-dbgsym libxendevicemodel1 
libxendevicemodel1-dbgsym libxenevtchn1 libxenevtchn1-dbgsym 
libxenforeignmemory1 libxenforeignmemory1-dbgsym libxengnttab1 
libxengnttab1-dbgsym libxenhypfs1 libxenhypfs1-dbgsym libxenmisc4.14 
libxenmisc4.14-dbgsym libxenstore3.0 libxenstore3.0-dbgsym libxentoolcore1 
libxentoolcore1-dbgsym libxentoollog1 libxentoollog1-dbgsym xen-doc 
xen-hypervisor-4.14-amd64 xen-hypervisor-common xen-system-amd64 xen-utils-4.14 
xen-utils-4.14-dbgsym xen-utils-common xen-utils-common-dbgsym xenstore-utils 
xenstore-utils-dbgsym
Architecture: source amd64 all
Version: 4.14.5+94-ge49571868d-1
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Maximilian Engelhardt <m...@daemonizer.de>
Description:
 libxen-dev - Public headers and libs for Xen
 libxencall1 - Xen runtime library - libxencall
 libxendevicemodel1 - Xen runtime libraries - libxendevicemodel
 libxenevtchn1 - Xen runtime libraries - libxenevtchn
 libxenforeignmemory1 - Xen runtime libraries - libxenforeignmemory
 libxengnttab1 - Xen runtime libraries - libxengnttab
 libxenhypfs1 - Xen runtime library - libxenhypfs
 libxenmisc4.14 - Xen runtime libraries - miscellaneous, versioned ABI
 libxenstore3.0 - Xen runtime libraries - libxenstore
 libxentoolcore1 - Xen runtime libraries - libxentoolcore
 libxentoollog1 - Xen runtime libraries - libxentoollog
 xen-doc    - XEN documentation
 xen-hypervisor-4.14-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-common - Xen Hypervisor - common files
 xen-system-amd64 - Xen System on AMD64 (metapackage)
 xen-utils-4.14 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore command line utilities for Xen
Closes: 1033297
Changes:
 xen (4.14.5+94-ge49571868d-1) bullseye-security; urgency=medium
 .
   * Update to new upstream version 4.14.5+94-ge49571868d, which also contains
     security fixes for the following issues: (Closes: #1033297)
     - x86: Multiple speculative security issues
       XSA-422 CVE-2022-23824
     - x86 shadow plus log-dirty mode use-after-free
       XSA-427 CVE-2022-42332
     - x86/HVM pinned cache attributes mis-handling
       XSA-428 CVE-2022-42333 CVE-2022-42334
     - x86: speculative vulnerability in 32bit SYSCALL path
       XSA-429 CVE-2022-42331
   * Note that the following XSA are not listed, because...
     - XSA-423 and XSA-424 have patches for the Linux kernel.
     - XSA-425 only applies to Xen 4.17 and newer
     - XSA-426 only applies to Xen 4.16 and newer
Checksums-Sha1:
 fba12fd2c12a8ac371c68ddbf88d91c35128bc15 4124 xen_4.14.5+94-ge49571868d-1.dsc
 1581f57554761e46458ec9d3194f1807bcc13f7a 4398680 
xen_4.14.5+94-ge49571868d.orig.tar.xz
 12da94c9d5cfdb7e547ffa016ae9b743b8042525 143836 
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
 c3b26427dfdf21c7b8a3390b82bd89fec45a0355 787628 
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
 39d24ce8b50515e166e8247a685a382a8beba059 13492 
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 9b1786108a103a4f146354bd06c788a3b09cf72c 39124 
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
 b433ec2f5515a7a42c004ac372013ce3783627c2 17564 
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 389ea64cf34404a685865f78ed4429b5dba2d094 39900 
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
 1a081bda25e7fb2f2dcbbf3275eaec4a5ddeaefe 7964 
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 96d09e1e8c40ba8f2136c2f44e902c69291a4692 37480 
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
 f2896ea1a80a57864744de52fd22f3d9c7c518a2 12316 
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 3c4d3564e7af43412633046e3e17460a9b5135d1 39380 
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
 4fc6693e156be6b48bd20b2cfdd1fc75e85ba649 16416 
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 6006852fc203924d95a841b82bd537aaa415ff01 39896 
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
 9b44aefd421a4320634101f82cea9d6c0e7a49c2 11852 
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 a9178cac6f49a1a19554ed876866591dd49eb34d 39444 
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
 05c5fcbfd6101c07161e1a03ab673f6c259948e3 2388864 
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 04d14235b49a6667776ecc643a5037ee2dd19cda 511096 
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
 56918667ed2826e68b58d2f96eb55236826009cc 34096 
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 a5d540141986aeff558a550a01bdc54d3bbf2d7c 46264 
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
 17462b7a5c9f6d5807bf7edc4d9a4f417a9d5da5 5472 
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 96868cbe4677b5c3ca4757b593bfa32d0a104aea 36936 
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
 022d91834049e709d1f796700dd153500ee66594 10896 
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 647f39a281d96b7a0721cdeae4da802bcc457370 38772 
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
 3ace9b50bdff8b4226e6819131e0c357846099e7 492828 
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
 d57b9ad9c4193a6cd27ee71c39798d49c70d2151 3533492 
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 aa9f99c2529bb5766fb44162622f4bd09bfb16fb 37016 
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
 00bceab9924e114027996349afc58d8b0d4ef977 34832 
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 1483964a2beec779264eaa1c1eae8a9a51915a6e 1132684 
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 ec825e1fc923a8f68ace34ccd21baeadef8af106 5341004 
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
 4ebefaf02760df7c1eb61272840773437573d7d8 264336 
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 c145b227e7e34736803adb7174ae0b2042131210 275704 
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
 2eba0ed76549e71baf8a6be491b60946a69dd45d 19350 
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
 20b85fc2bd908b4f2e701908cf0f3892fc346b5b 20536 
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 88201470d7e2d9f912d6a8176f80155b9baff655 54372 
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb
Checksums-Sha256:
 b95e30811596708b86ac8f6ac1f20c7adc288b7dd09f84a5f5f0805eda90ecd3 4124 
xen_4.14.5+94-ge49571868d-1.dsc
 ad3fb9c7fe0499b6037561381ba8f1593d19dc9b210dd29d811a0195a3eb50c3 4398680 
xen_4.14.5+94-ge49571868d.orig.tar.xz
 ca25fdc281faa511233f82608351dafbe568d6f20fa58f7a673c0c0a5d9fd47f 143836 
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
 7f8fdb3ef1272a79844c18ae1c4d1fc2f2fe4f7235334e511fad365fcf6a823c 787628 
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
 86ff9e62ce0f0d29721921e76f76806deb3d0dd4974ca6a7444db552a097682b 13492 
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 31989039604b7cf8afb9a892240e49c0062339fd563ab434ab3c2cdf3dbc4f38 39124 
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
 955e8d341546e8e572d7711d0874f0bcfb4595ed3f48f57b2955b101affd41bd 17564 
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 78c57909d21d3c649719495f90e76f7e6bc56f387034a7801f0bacdb6019a23c 39900 
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
 f57aa9665c2f984be7bf1f6747a152d8ec79c3953003d4e543429e6159080617 7964 
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 3dd1be79f8410f5cd3b603db09977519b00f55968db65cce28f6afc5cbb02333 37480 
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
 b9c27e9c94a8fc0c716d42f9bfc22b344005059e9b53bdcc7cbd0f5319751771 12316 
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 3d46061298285235a96e8dd5451547e25dd5985d9de1d5b16f6ebac14d316495 39380 
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
 4f92fb33651fc662c9c5d6d254ef394561a42c470a8c83208f97466e74ce1cb1 16416 
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 bc74d175a930210e015c0b001d5952de861bd6a5e5f91a5dd116d40590f41b80 39896 
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
 d94c2ec3f7aa1f9ddf74e5e34e252543b5d249b9c6913f41302b19160b9ab015 11852 
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 5bac311203249df345718fc93e7d1a337c8ac820aa9ef017790351540f915b43 39444 
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
 8731e895cf82727f7d35f5d409df3d84decddc051f1a140870e6ff63aa7f240c 2388864 
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 00d183e6b4b04b6985df26fd345fa3ffe398bb20d3d1d8779398e5e157d561f7 511096 
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
 4daf7d239ff0ef7058ac2e998faf68c891586e3bd72d62e1fdef0782c760acb4 34096 
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 0c1ba9181c5a930bc2edef9e445c6493dab959efcaa1426953c9a464807a4c56 46264 
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
 970dd18d5453c47b551d7a79c04b5f32a386a785b12bd304bcb6ef91077e1bbd 5472 
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 c1ad83d7fc33d40efa08caa8dddaa5308468ea230a5b725331c2780826c1b062 36936 
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
 fcd963409f989f0d7bda82c0cddda226e50979160cd26b2ee52810fa28c2ecea 10896 
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 0ed762b3e65574310fbd8baca153b2164d5b9f9871fe71c6e3f011ad7cf302b8 38772 
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
 0a37b0a0a2dbb4bac3cf07c14f660259cf9f009f20a1a5cf9261ab6e3edf71bc 492828 
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
 341b9686b50f7002a2cbf5565b2774537537540251b62e34f13d57b6d247766d 3533492 
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 b28350e014ef86f69c2b12765a62de76b28cbc90ee9a1ad3aacecfa46057282c 37016 
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
 e7f33d061be5296c61ac9ef3b88d32417bd1a2b6f82a44e04164473835436829 34832 
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 85bebd569cb0df7108ab933ad150352489c4c661c10f70c54a65e00c022006e4 1132684 
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 8d0b8a19188a461d4e99b238f82469ab91869b6faca874e07123aa66e8448ef0 5341004 
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
 dc832619509d72289e2b1aa555e62a6ba59da39ef6ee7465971a1716a2955138 264336 
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 461749c2310a3aa3b923b9b0a368dc50597fe11b10178eb845f02a12f9cb061a 275704 
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
 5273161bb20177358c6918f5dc5b7e9cc5c49e2fce8615bd70ef57af6eb8ff3e 19350 
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
 5a4ebc4dbb7211da3e60d7dc5d0c0f7cef3b315ba48bd5c1de343bfe131ba52f 20536 
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 e8ed3b117c14acdc081709a9ca0371576d4226a39187b10aa5fc02dd037436f3 54372 
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb
Files:
 7b7b178bfc918112d3ac5b3e4e0e204b 4124 admin optional 
xen_4.14.5+94-ge49571868d-1.dsc
 4db8c74d5fdc054ea6952b2ba9f3b06b 4398680 admin optional 
xen_4.14.5+94-ge49571868d.orig.tar.xz
 609437e8007afa12d97eddc2fe1c9db7 143836 admin optional 
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
 bc53d3795a41b5889f29301e792c51db 787628 libdevel optional 
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
 ca1b4adfadb54703f0e275cab26c1cb0 13492 debug optional 
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 47b28436b4001b87b6de7372a519d114 39124 libs optional 
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
 d23f19a5766ae0cbe6313601ae001768 17564 debug optional 
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 797bbf514a6aebdaf7d4a721a26581bc 39900 libs optional 
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
 e5fc2cca5d8deae22bec375be952246f 7964 debug optional 
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 8bd1f102367b20320b5da9856b38e5d9 37480 libs optional 
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
 eeaea69e80b01de98f8f3648f331885f 12316 debug optional 
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 e72389ffee601a4ba45a284435f63dd5 39380 libs optional 
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
 cd5874d671ad10ca4d53634c601ca3d7 16416 debug optional 
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 66ca7ee2b8bcc15e01c300cb4f12d412 39896 libs optional 
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
 8baa3b2a37eee5f9d932e8a6ae911160 11852 debug optional 
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 0eaecdc8907e659ae191d177a3843609 39444 libs optional 
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
 097bf82ed87fb4511af434bcaaddd3a4 2388864 debug optional 
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 64dcf56ee69f06db99a7265c39e2eace 511096 libs optional 
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
 7bd8513ee04c965c9ee57dc866f55581 34096 debug optional 
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 36364c40a47b2bad9c260b70939aa2e1 46264 libs optional 
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
 6ebc48f577c86b116b4d435791a29fe9 5472 debug optional 
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 548cb920c8d9cdaebceadcf4c752b6fa 36936 libs optional 
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
 13aa6df38e8ba0209ae7e180d2a90fe1 10896 debug optional 
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 e567b943a3b78de00285c9c443b9d40a 38772 libs optional 
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
 a2865a3791b061871ca4a443e5e640f8 492828 doc optional 
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
 9f2426779987afd9e4d00e159b0146de 3533492 kernel optional 
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 db22abe5337bc35e1ef9f68f1fc738f1 37016 kernel optional 
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
 85a36626fe3cae61393f3ea80673b1b1 34832 admin optional 
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
 d2220629c732bfc9f515f51f59140b0e 1132684 debug optional 
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 31d18bf8bc11f7afd5f51ba8f2626dbf 5341004 admin optional 
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
 bd239c2b41e81bbc6a04340d117a78cf 264336 debug optional 
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 8b10334781f6f79a7b6cadffca0c7b5d 275704 admin optional 
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
 07c1d11db1e587a82076b37e41ce0c56 19350 admin optional 
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
 b37c319a358245b87fbc05d04f2168af 20536 debug optional 
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
 538a9f3551989e2de1ceeb1d36c760e7 54372 admin optional 
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmQds0kACgkQEMKTtsN8
Tja6MQ/9FJVRrjXBrn8nzASkk1eKdaftYZasKnu4pYNpsC38IE7Zo+i9CfQfB4Z8
adbh9k7F5jwjNdkjsJ++m8hVkxERV0ZDpK8XpDgjy9kd25A1YV5mIOzZD0LHauTg
fPYIjd/kDsVAlYkMb1oBm1skt3V47ssSMxhk1e98vVSYGO4UNWlL0pxTYKudMUOH
yYLF6/uTaWbYXx9bo7yI91wOKSPvIScuPN5KwnTUnDr00zqXCu6qoeBu44/q0xbz
VIbFSFfp8adkDPozmqLxpIJ6jSdlqUVd1501XyWZMPsqQ9IY7B/eTyuJLjYU7/bs
NZ4abXVZ1eZbWm635p5fzM0ADftiHBJl7tf+tX5K040jTqtcWS3/Q8foVe7acph0
WaDGKRwcIq+X9FvazuUdB9UxKLR9eaBDHvVvzZYcJHsW/vu5Xqq4VscyE01MHLiy
Tyk0ddX5FZJpCfMlw6PV1p/WJJ+RY7VgEoBvTIZWB2DH3zeoIIAMpTgBZLUdXt2H
YNq/k+CPvVhMrVlLCng3PkFsQOTSla0e/OCbjuoZ+QQP+Ar9pjkp0HLpbo+VTHaD
9GvdqxgEa/PNDuVzdi6vCNfPI12sk3VTJOk9vkIMiFXtFUJRHy6+CUwijrdqhSTr
RZo14BusJJGMbVHVGMt02gxoI51JL5dARIwEqObe7emnx4Swzhw=
=1ZnM
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to