Your message dated Wed, 29 Mar 2023 07:32:14 +0000
with message-id <e1phqi2-000q0s...@fasolo.debian.org>
and subject line Bug#1033297: fixed in xen 4.14.5+94-ge49571868d-1
has caused the Debian Bug report #1033297,
regarding xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1033297: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xen
Version: 4.17.0+46-gaaf74a532c-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi,
The following vulnerabilities were published for xen.
CVE-2022-42331[0]:
| x86: speculative vulnerability in 32bit SYSCALL path Due to an
| oversight in the very original Spectre/Meltdown security work
| (XSA-254), one entrypath performs its speculation-safety actions too
| late. In some configurations, there is an unprotected RET instruction
| which can be attacked with a variety of speculative attacks.
CVE-2022-42332[1]:
| x86 shadow plus log-dirty mode use-after-free In environments where
| host assisted address translation is necessary but Hardware Assisted
| Paging (HAP) is unavailable, Xen will run guests in so called shadow
| mode. Shadow mode maintains a pool of memory used for both shadow page
| tables as well as auxiliary data structures. To migrate or snapshot
| guests, Xen additionally runs them in so called log-dirty mode. The
| data structures needed by the log-dirty tracking are part of
| aformentioned auxiliary data. In order to keep error handling efforts
| within reasonable bounds, for operations which may require memory
| allocations shadow mode logic ensures up front that enough memory is
| available for the worst case requirements. Unfortunately, while page
| table memory is properly accounted for on the code path requiring the
| potential establishing of new shadows, demands by the log-dirty
| infrastructure were not taken into consideration. As a result, just
| established shadow page tables could be freed again immediately, while
| other code is still accessing them on the assumption that they would
| remain allocated.
CVE-2022-42333[2]:
| x86/HVM pinned cache attributes mis-handling T[his CNA information
| record relates to multiple CVEs; the text explains which
| aspects/vulnerabilities correspond to which CVE.] To allow cachability
| control for HVM guests with passed through devices, an interface
| exists to explicitly override defaults which would otherwise be put in
| place. While not exposed to the affected guests themselves, the
| interface specifically exists for domains controlling such guests.
| This interface may therefore be used by not fully privileged entities,
| e.g. qemu running deprivileged in Dom0 or qemu running in a so called
| stub-domain. With this exposure it is an issue that - the number of
| the such controlled regions was unbounded (CVE-2022-42333), -
| installation and removal of such regions was not properly serialized
| (CVE-2022-42334).
CVE-2022-42334[3]:
| x86/HVM pinned cache attributes mis-handling T[his CNA information
| record relates to multiple CVEs; the text explains which
| aspects/vulnerabilities correspond to which CVE.] To allow cachability
| control for HVM guests with passed through devices, an interface
| exists to explicitly override defaults which would otherwise be put in
| place. While not exposed to the affected guests themselves, the
| interface specifically exists for domains controlling such guests.
| This interface may therefore be used by not fully privileged entities,
| e.g. qemu running deprivileged in Dom0 or qemu running in a so called
| stub-domain. With this exposure it is an issue that - the number of
| the such controlled regions was unbounded (CVE-2022-42333), -
| installation and removal of such regions was not properly serialized
| (CVE-2022-42334).
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-42331
https://www.cve.org/CVERecord?id=CVE-2022-42331
[1] https://security-tracker.debian.org/tracker/CVE-2022-42332
https://www.cve.org/CVERecord?id=CVE-2022-42332
[2] https://security-tracker.debian.org/tracker/CVE-2022-42333
https://www.cve.org/CVERecord?id=CVE-2022-42333
[3] https://security-tracker.debian.org/tracker/CVE-2022-42334
https://www.cve.org/CVERecord?id=CVE-2022-42334
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.14.5+94-ge49571868d-1
Done: Maximilian Engelhardt <m...@daemonizer.de>
We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1033...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Maximilian Engelhardt <m...@daemonizer.de> (supplier of updated xen package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Thu, 23 Mar 2023 20:40:49 +0100
Source: xen
Binary: libxen-dev libxencall1 libxencall1-dbgsym libxendevicemodel1
libxendevicemodel1-dbgsym libxenevtchn1 libxenevtchn1-dbgsym
libxenforeignmemory1 libxenforeignmemory1-dbgsym libxengnttab1
libxengnttab1-dbgsym libxenhypfs1 libxenhypfs1-dbgsym libxenmisc4.14
libxenmisc4.14-dbgsym libxenstore3.0 libxenstore3.0-dbgsym libxentoolcore1
libxentoolcore1-dbgsym libxentoollog1 libxentoollog1-dbgsym xen-doc
xen-hypervisor-4.14-amd64 xen-hypervisor-common xen-system-amd64 xen-utils-4.14
xen-utils-4.14-dbgsym xen-utils-common xen-utils-common-dbgsym xenstore-utils
xenstore-utils-dbgsym
Architecture: source amd64 all
Version: 4.14.5+94-ge49571868d-1
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Maximilian Engelhardt <m...@daemonizer.de>
Description:
libxen-dev - Public headers and libs for Xen
libxencall1 - Xen runtime library - libxencall
libxendevicemodel1 - Xen runtime libraries - libxendevicemodel
libxenevtchn1 - Xen runtime libraries - libxenevtchn
libxenforeignmemory1 - Xen runtime libraries - libxenforeignmemory
libxengnttab1 - Xen runtime libraries - libxengnttab
libxenhypfs1 - Xen runtime library - libxenhypfs
libxenmisc4.14 - Xen runtime libraries - miscellaneous, versioned ABI
libxenstore3.0 - Xen runtime libraries - libxenstore
libxentoolcore1 - Xen runtime libraries - libxentoolcore
libxentoollog1 - Xen runtime libraries - libxentoollog
xen-doc - XEN documentation
xen-hypervisor-4.14-amd64 - Xen Hypervisor on AMD64
xen-hypervisor-common - Xen Hypervisor - common files
xen-system-amd64 - Xen System on AMD64 (metapackage)
xen-utils-4.14 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore command line utilities for Xen
Closes: 1033297
Changes:
xen (4.14.5+94-ge49571868d-1) bullseye-security; urgency=medium
.
* Update to new upstream version 4.14.5+94-ge49571868d, which also contains
security fixes for the following issues: (Closes: #1033297)
- x86: Multiple speculative security issues
XSA-422 CVE-2022-23824
- x86 shadow plus log-dirty mode use-after-free
XSA-427 CVE-2022-42332
- x86/HVM pinned cache attributes mis-handling
XSA-428 CVE-2022-42333 CVE-2022-42334
- x86: speculative vulnerability in 32bit SYSCALL path
XSA-429 CVE-2022-42331
* Note that the following XSA are not listed, because...
- XSA-423 and XSA-424 have patches for the Linux kernel.
- XSA-425 only applies to Xen 4.17 and newer
- XSA-426 only applies to Xen 4.16 and newer
Checksums-Sha1:
fba12fd2c12a8ac371c68ddbf88d91c35128bc15 4124 xen_4.14.5+94-ge49571868d-1.dsc
1581f57554761e46458ec9d3194f1807bcc13f7a 4398680
xen_4.14.5+94-ge49571868d.orig.tar.xz
12da94c9d5cfdb7e547ffa016ae9b743b8042525 143836
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
c3b26427dfdf21c7b8a3390b82bd89fec45a0355 787628
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
39d24ce8b50515e166e8247a685a382a8beba059 13492
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
9b1786108a103a4f146354bd06c788a3b09cf72c 39124
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
b433ec2f5515a7a42c004ac372013ce3783627c2 17564
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
389ea64cf34404a685865f78ed4429b5dba2d094 39900
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
1a081bda25e7fb2f2dcbbf3275eaec4a5ddeaefe 7964
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
96d09e1e8c40ba8f2136c2f44e902c69291a4692 37480
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
f2896ea1a80a57864744de52fd22f3d9c7c518a2 12316
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
3c4d3564e7af43412633046e3e17460a9b5135d1 39380
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
4fc6693e156be6b48bd20b2cfdd1fc75e85ba649 16416
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
6006852fc203924d95a841b82bd537aaa415ff01 39896
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
9b44aefd421a4320634101f82cea9d6c0e7a49c2 11852
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
a9178cac6f49a1a19554ed876866591dd49eb34d 39444
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
05c5fcbfd6101c07161e1a03ab673f6c259948e3 2388864
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
04d14235b49a6667776ecc643a5037ee2dd19cda 511096
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
56918667ed2826e68b58d2f96eb55236826009cc 34096
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
a5d540141986aeff558a550a01bdc54d3bbf2d7c 46264
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
17462b7a5c9f6d5807bf7edc4d9a4f417a9d5da5 5472
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
96868cbe4677b5c3ca4757b593bfa32d0a104aea 36936
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
022d91834049e709d1f796700dd153500ee66594 10896
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
647f39a281d96b7a0721cdeae4da802bcc457370 38772
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
3ace9b50bdff8b4226e6819131e0c357846099e7 492828
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
d57b9ad9c4193a6cd27ee71c39798d49c70d2151 3533492
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
aa9f99c2529bb5766fb44162622f4bd09bfb16fb 37016
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
00bceab9924e114027996349afc58d8b0d4ef977 34832
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
1483964a2beec779264eaa1c1eae8a9a51915a6e 1132684
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
ec825e1fc923a8f68ace34ccd21baeadef8af106 5341004
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
4ebefaf02760df7c1eb61272840773437573d7d8 264336
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
c145b227e7e34736803adb7174ae0b2042131210 275704
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
2eba0ed76549e71baf8a6be491b60946a69dd45d 19350
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
20b85fc2bd908b4f2e701908cf0f3892fc346b5b 20536
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
88201470d7e2d9f912d6a8176f80155b9baff655 54372
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb
Checksums-Sha256:
b95e30811596708b86ac8f6ac1f20c7adc288b7dd09f84a5f5f0805eda90ecd3 4124
xen_4.14.5+94-ge49571868d-1.dsc
ad3fb9c7fe0499b6037561381ba8f1593d19dc9b210dd29d811a0195a3eb50c3 4398680
xen_4.14.5+94-ge49571868d.orig.tar.xz
ca25fdc281faa511233f82608351dafbe568d6f20fa58f7a673c0c0a5d9fd47f 143836
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
7f8fdb3ef1272a79844c18ae1c4d1fc2f2fe4f7235334e511fad365fcf6a823c 787628
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
86ff9e62ce0f0d29721921e76f76806deb3d0dd4974ca6a7444db552a097682b 13492
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
31989039604b7cf8afb9a892240e49c0062339fd563ab434ab3c2cdf3dbc4f38 39124
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
955e8d341546e8e572d7711d0874f0bcfb4595ed3f48f57b2955b101affd41bd 17564
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
78c57909d21d3c649719495f90e76f7e6bc56f387034a7801f0bacdb6019a23c 39900
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
f57aa9665c2f984be7bf1f6747a152d8ec79c3953003d4e543429e6159080617 7964
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
3dd1be79f8410f5cd3b603db09977519b00f55968db65cce28f6afc5cbb02333 37480
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
b9c27e9c94a8fc0c716d42f9bfc22b344005059e9b53bdcc7cbd0f5319751771 12316
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
3d46061298285235a96e8dd5451547e25dd5985d9de1d5b16f6ebac14d316495 39380
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
4f92fb33651fc662c9c5d6d254ef394561a42c470a8c83208f97466e74ce1cb1 16416
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
bc74d175a930210e015c0b001d5952de861bd6a5e5f91a5dd116d40590f41b80 39896
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
d94c2ec3f7aa1f9ddf74e5e34e252543b5d249b9c6913f41302b19160b9ab015 11852
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
5bac311203249df345718fc93e7d1a337c8ac820aa9ef017790351540f915b43 39444
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
8731e895cf82727f7d35f5d409df3d84decddc051f1a140870e6ff63aa7f240c 2388864
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
00d183e6b4b04b6985df26fd345fa3ffe398bb20d3d1d8779398e5e157d561f7 511096
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
4daf7d239ff0ef7058ac2e998faf68c891586e3bd72d62e1fdef0782c760acb4 34096
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
0c1ba9181c5a930bc2edef9e445c6493dab959efcaa1426953c9a464807a4c56 46264
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
970dd18d5453c47b551d7a79c04b5f32a386a785b12bd304bcb6ef91077e1bbd 5472
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
c1ad83d7fc33d40efa08caa8dddaa5308468ea230a5b725331c2780826c1b062 36936
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
fcd963409f989f0d7bda82c0cddda226e50979160cd26b2ee52810fa28c2ecea 10896
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
0ed762b3e65574310fbd8baca153b2164d5b9f9871fe71c6e3f011ad7cf302b8 38772
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
0a37b0a0a2dbb4bac3cf07c14f660259cf9f009f20a1a5cf9261ab6e3edf71bc 492828
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
341b9686b50f7002a2cbf5565b2774537537540251b62e34f13d57b6d247766d 3533492
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
b28350e014ef86f69c2b12765a62de76b28cbc90ee9a1ad3aacecfa46057282c 37016
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
e7f33d061be5296c61ac9ef3b88d32417bd1a2b6f82a44e04164473835436829 34832
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
85bebd569cb0df7108ab933ad150352489c4c661c10f70c54a65e00c022006e4 1132684
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
8d0b8a19188a461d4e99b238f82469ab91869b6faca874e07123aa66e8448ef0 5341004
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
dc832619509d72289e2b1aa555e62a6ba59da39ef6ee7465971a1716a2955138 264336
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
461749c2310a3aa3b923b9b0a368dc50597fe11b10178eb845f02a12f9cb061a 275704
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
5273161bb20177358c6918f5dc5b7e9cc5c49e2fce8615bd70ef57af6eb8ff3e 19350
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
5a4ebc4dbb7211da3e60d7dc5d0c0f7cef3b315ba48bd5c1de343bfe131ba52f 20536
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
e8ed3b117c14acdc081709a9ca0371576d4226a39187b10aa5fc02dd037436f3 54372
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb
Files:
7b7b178bfc918112d3ac5b3e4e0e204b 4124 admin optional
xen_4.14.5+94-ge49571868d-1.dsc
4db8c74d5fdc054ea6952b2ba9f3b06b 4398680 admin optional
xen_4.14.5+94-ge49571868d.orig.tar.xz
609437e8007afa12d97eddc2fe1c9db7 143836 admin optional
xen_4.14.5+94-ge49571868d-1.debian.tar.xz
bc53d3795a41b5889f29301e792c51db 787628 libdevel optional
libxen-dev_4.14.5+94-ge49571868d-1_amd64.deb
ca1b4adfadb54703f0e275cab26c1cb0 13492 debug optional
libxencall1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
47b28436b4001b87b6de7372a519d114 39124 libs optional
libxencall1_4.14.5+94-ge49571868d-1_amd64.deb
d23f19a5766ae0cbe6313601ae001768 17564 debug optional
libxendevicemodel1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
797bbf514a6aebdaf7d4a721a26581bc 39900 libs optional
libxendevicemodel1_4.14.5+94-ge49571868d-1_amd64.deb
e5fc2cca5d8deae22bec375be952246f 7964 debug optional
libxenevtchn1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
8bd1f102367b20320b5da9856b38e5d9 37480 libs optional
libxenevtchn1_4.14.5+94-ge49571868d-1_amd64.deb
eeaea69e80b01de98f8f3648f331885f 12316 debug optional
libxenforeignmemory1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
e72389ffee601a4ba45a284435f63dd5 39380 libs optional
libxenforeignmemory1_4.14.5+94-ge49571868d-1_amd64.deb
cd5874d671ad10ca4d53634c601ca3d7 16416 debug optional
libxengnttab1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
66ca7ee2b8bcc15e01c300cb4f12d412 39896 libs optional
libxengnttab1_4.14.5+94-ge49571868d-1_amd64.deb
8baa3b2a37eee5f9d932e8a6ae911160 11852 debug optional
libxenhypfs1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
0eaecdc8907e659ae191d177a3843609 39444 libs optional
libxenhypfs1_4.14.5+94-ge49571868d-1_amd64.deb
097bf82ed87fb4511af434bcaaddd3a4 2388864 debug optional
libxenmisc4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
64dcf56ee69f06db99a7265c39e2eace 511096 libs optional
libxenmisc4.14_4.14.5+94-ge49571868d-1_amd64.deb
7bd8513ee04c965c9ee57dc866f55581 34096 debug optional
libxenstore3.0-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
36364c40a47b2bad9c260b70939aa2e1 46264 libs optional
libxenstore3.0_4.14.5+94-ge49571868d-1_amd64.deb
6ebc48f577c86b116b4d435791a29fe9 5472 debug optional
libxentoolcore1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
548cb920c8d9cdaebceadcf4c752b6fa 36936 libs optional
libxentoolcore1_4.14.5+94-ge49571868d-1_amd64.deb
13aa6df38e8ba0209ae7e180d2a90fe1 10896 debug optional
libxentoollog1-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
e567b943a3b78de00285c9c443b9d40a 38772 libs optional
libxentoollog1_4.14.5+94-ge49571868d-1_amd64.deb
a2865a3791b061871ca4a443e5e640f8 492828 doc optional
xen-doc_4.14.5+94-ge49571868d-1_amd64.deb
9f2426779987afd9e4d00e159b0146de 3533492 kernel optional
xen-hypervisor-4.14-amd64_4.14.5+94-ge49571868d-1_amd64.deb
db22abe5337bc35e1ef9f68f1fc738f1 37016 kernel optional
xen-hypervisor-common_4.14.5+94-ge49571868d-1_all.deb
85a36626fe3cae61393f3ea80673b1b1 34832 admin optional
xen-system-amd64_4.14.5+94-ge49571868d-1_amd64.deb
d2220629c732bfc9f515f51f59140b0e 1132684 debug optional
xen-utils-4.14-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
31d18bf8bc11f7afd5f51ba8f2626dbf 5341004 admin optional
xen-utils-4.14_4.14.5+94-ge49571868d-1_amd64.deb
bd239c2b41e81bbc6a04340d117a78cf 264336 debug optional
xen-utils-common-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
8b10334781f6f79a7b6cadffca0c7b5d 275704 admin optional
xen-utils-common_4.14.5+94-ge49571868d-1_amd64.deb
07c1d11db1e587a82076b37e41ce0c56 19350 admin optional
xen_4.14.5+94-ge49571868d-1_amd64.buildinfo
b37c319a358245b87fbc05d04f2168af 20536 debug optional
xenstore-utils-dbgsym_4.14.5+94-ge49571868d-1_amd64.deb
538a9f3551989e2de1ceeb1d36c760e7 54372 admin optional
xenstore-utils_4.14.5+94-ge49571868d-1_amd64.deb
-----BEGIN PGP SIGNATURE-----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=1ZnM
-----END PGP SIGNATURE-----
--- End Message ---