Your message dated Mon, 23 Dec 2024 11:34:34 +0000
with message-id <e1tpghm-001fvc...@fasolo.debian.org>
and subject line Bug#1036601: fixed in xen 4.19.1-1
has caused the Debian Bug report #1036601,
regarding xenstore-utils: broken symlink /usr/bin/xenstore-control
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1036601: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036601
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xenstore-utils
Version: 4.17.0+74-g3eac216e6e-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package ships (or creates)
a broken symlink:
0m15.9s ERROR: FAIL: Broken symlinks:
/usr/bin/xenstore-control -> ../lib/xen-common/bin/xen-utils-wrapper
(xenstore-utils)
cheers,
Andreas
--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.19.1-1
Done: Hans van Kranenburg <h...@knorrie.org>
We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1036...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Hans van Kranenburg <h...@knorrie.org> (supplier of updated xen package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 21 Dec 2024 11:33:16 +0100
Source: xen
Architecture: source
Version: 4.19.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <h...@knorrie.org>
Closes: 989560 1029998 1036601 1073913 1089033 1089621
Changes:
xen (4.19.1-1) unstable; urgency=medium
.
* Upload to unstable (Closes: #1089033)
* Pick upstream commit e6472d46680c ("tools/xg: increase LZMA_BLOCK_SIZE for
uncompressing the kernel") to fix decompressing Linux 6.12 when starting
in PV mode.
* Note that the following XSA were not listed, because...
- XSA-465 has patches for the Linux kernel.
- XSA-466 contains a documentation update that was only applied to the
current development version of Xen
.
xen (4.19.1-1~exp4) experimental; urgency=medium
.
* Upload again, with binaries this time.
.
xen (4.19.1-1~exp3) experimental; urgency=medium
.
* d/copyright: Fix invalid "-present" copyright years. (Closes: #1089621)
.
xen (4.19.1-1~exp2) experimental; urgency=medium
.
* Drop support for armhf (Closes: #989560)
- src:xen now FTBFS on armhf because OCaml 5.x has no support for native
compilation on 32-bit systems any more.
- As seen in #989560, Xen on armhf was already dysfunctional for years
- The team does not have resources or knowledge to support the armhf build
.
[ Maximilian Engelhardt ]
.
* d/control: Add Maximilian Engelhardt to Uploaders
* d/copyright: Specify correct years for authors of debian/*
* debian: undo ABI-stable t64 package renaming
.
xen (4.19.1-1~exp1) experimental; urgency=medium
.
* Update to new upstream version 4.19.1, which also contains
security fixes for the following issues:
- x86: Deadlock in vlapic_error()
XSA-462 CVE-2024-45817
- Deadlock in x86 HVM standard VGA handling
XSA-463 CVE-2024-45818
- libxl leaks data to PVH guests via ACPI tables
XSA-464 CVE-2024-45819
* Fix compilation on arm64 and armhf with upstream commit ee826bc490
("Arm64: adjust __irq_to_desc() to fix build with gcc14")
.
xen (4.19.0+14-g0918434e0f-1~exp1) experimental; urgency=medium
.
Significant changes:
* Update to new upstream version 4.19.0+14-g0918434e0f, which also contains
security fixes for the following issues:
- x86: Register File Data Sampling
XSA-452 CVE-2023-28746
- GhostRace: Speculative Race Conditions
XSA-453 CVE-2024-2193
- x86 HVM hypercalls may trigger Xen bug check
XSA-454 CVE-2023-46842
- x86: Incorrect logic for BTC/SRSO mitigations
XSA-455 CVE-2024-31142
- x86: Native Branch History Injection
XSA-456 CVE-2024-2201
- double unlock in x86 guest IRQ handling
XSA-458 CVE-2024-31143
- error handling in x86 IOMMU identity mapping
XSA-460 CVE-2024-31145
- PCI device pass-through with shared resources
XSA-461 CVE-2024-31146
* Note that the following XSA are not listed, because...
- XSA-457 has patches for the Linux kernel.
- XSA-459 is within Xapi which is not shipped by this package.
* Fix compilation with OCaml 5.2.0 (Closes: #1073913)
.
Changes related to upgrading to Xen 4.19:
* debian/control: adjust to 4.19
* debian/copyright: update for xen 4.19
* Refresh remaining patches if needed
.
Packaging minor fixes and improvements:
* debian/control: remove old version constraints and cleanup
* debian/control: update Standards-Version to 4.7.0
* debian/control: add python3-setuptools dependency
* debian/rules: cleanup and improved comments
* debian/rules: enable parallel build
* debian/rules: move xenstore-control to xen-utils-common (Closes: #1036601)
* debian: ship systemd service files for xen and xendomains
(Closes: #1029998)
* docs/Makefile: Work around a reproducibility issue by generating
documentation for ppc and riscv architectures.
Checksums-Sha1:
179c6ef611c2d1a511f002d1ff624c7eb4d356ae 4052 xen_4.19.1-1.dsc
cd4224008743ae49e1468ed6ea8a20fefe18d3b6 140568 xen_4.19.1-1.debian.tar.xz
Checksums-Sha256:
2c41e486c4d27fe5a866f014dc9ac1af7c5f2a5be74545b421b3469945689352 4052
xen_4.19.1-1.dsc
34fae8347ddaa3f2a277f1aae5b5a335a79a28f57ab0e757edacc78607140357 140568
xen_4.19.1-1.debian.tar.xz
Files:
8bed5e8829570c4f3f1a4b460ea05dc0 4052 admin optional xen_4.19.1-1.dsc
b1fe28131bbdbf6ef45540cd420ff04f 140568 admin optional
xen_4.19.1-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=mwqu
-----END PGP SIGNATURE-----
pgp3zHFE4CPyy.pgp
Description: PGP signature
--- End Message ---