Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: xen-libs | Distribution: Fedora Project |
Version: 4.14.0 | Vendor: Fedora Project |
Release: 5.fc33 | Build date: Fri Sep 25 19:46:52 2020 |
Group: Unspecified | Build host: buildvm-a64-06.iad2.fedoraproject.org |
Size: 2618508 | Source RPM: xen-4.14.0-5.fc33.src.rpm |
Packager: Fedora Project | |
Url: http://xen.org/ | |
Summary: Libraries for Xen tools |
This package contains the libraries needed to run applications which manage Xen virtual machines.
GPLv2+ and LGPLv2+ and BSD
* Tue Sep 22 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-5 - x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (#1881619) - Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (#1881616) - race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (#1881618) - PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (#1881587) - once valid event channels may not turn invalid [XSA-338, CVE-2020-25597] (#1881588) - x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596] (#1881617) - Missing memory barriers when accessing/allocating an event channel [XSA-340, CVE-2020-25603] (#1881583) - out of bounds event channels available to 32-bit x86 domains [XSA-342, CVE-2020-25600] (#1881582) - races with evtchn_reset() [XSA-343, CVE-2020-25599] (#1881581) - lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344, CVE-2020-25601] (#1881586) * Thu Sep 03 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-4 - rebuild for OCaml 4.11.1 * Mon Aug 24 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-3 - QEMU: usb: out-of-bounds r/w access issue [XSA-335, CVE-2020-14364] (#1871850) * Wed Jul 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 4.14.0-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Sun Jul 26 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-1 - update to 4.14.0 remove or adjust patches now included or superceded upstream adjust xen.hypervisor.config bison and flex packages now needed for hypervisor build /usr/bin/vchan-socket-proxy and /usr/sbin/xenhypfs have been added with associated libraries and man page - re-enable pandoc for more documentation adding xen-vbd-interface.7.gz - revise documentation build dependencies drop tex, texinfo, ghostscript, graphviz, discount add perl(Pod::Html) perl(File::Find) - additional build dependency for ocaml on perl(Data::Dumper) * Tue Jul 14 2020 Tom Stellard <tstellar@redhat.com> - 4.13.1-5 - Use make macros - https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro * Tue Jul 07 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.1-4 - incorrect error handling in event channel port allocation leads to DoS [XSA-317, CVE-2020-15566] (#1854465) - inverted code paths in x86 dirty VRAM tracking leads to DoS [XSA-319, CVE-2020-15563] (#1854463) - xen: insufficient cache write-back under VT-d leads to DoS [XSA-321, CVE-2020-15565] (#1854467) - missing alignment check in VCPUOP_register_vcpu_info leads to DoS [XSA-327, CVE-2020-15564] (#1854458) - non-atomic modification of live EPT PTE leads to DoS [XSA-328, CVE-2020-15567] (#1854464) * Tue Jun 30 2020 Jeff Law <law@redhat.com> Disable LTO * Wed Jun 10 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.1-3 - Special Register Buffer speculative side channel [XSA-320] * Tue May 26 2020 Miro Hrončok <mhroncok@redhat.com> - 4.13.1-2 - Rebuilt for Python 3.9 * Tue May 19 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.1-1 - update to 4.13.1 remove patches now included or superceded upstream * Tue May 05 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-8 - build aarch64 hypervisor with -mno-outline-atomics to fix gcc 10 build * Tue Apr 14 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-7 - multiple xenoprof issues [XSA-313, CVE-2020-11740, CVE-2020-11741] (#1823912, #1823914) - Missing memory barriers in read-write unlock paths [XSA-314, CVE-2020-11739] (#1823784) - Bad error path in GNTTABOP_map_grant [XSA-316, CVE-2020-11743] (#1823926) - Bad continuation handling in GNTTABOP_copy [XSA-318, CVE-2020-11742] (#1823943) * Tue Mar 17 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-6 - fix issues in pygrub dependency found by python 3.8 * Tue Mar 10 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-5 - setting for --with-system-ipxe should be a rom file (#1778516) - add weak depends on ipxe-roms-qemu and qemu-system-x86-core * Fri Jan 31 2020 Fedora Release Engineering <releng@fedoraproject.org> - 4.13.0-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Wed Jan 22 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-3 - build fixes for OCaml 4.10.0 and gcc 10 * Tue Jan 14 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-2 - arm: a CPU may speculate past the ERET instruction [XSA-312] - use more explicit library names - add weak requires for perl (/etc/xen/scripts/locking.sh) * Wed Dec 18 2019 Michael Young <m.a.young@durham.ac.uk> - 4.13.0-1 - update to 4.13.0 remove patches now included or superceded upstream adjust xen.hypervisor.config /usr/sbin/xen-tmem-list-parse has been removed pkgconfig files have moved to %{_libdir}/pkgconfig /usr/sbin/xen-ucode has been added (x86 only) * Sun Dec 15 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-9 - fix build with OCaml 4.09.0 * Wed Dec 11 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-8 - denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311 * Tue Nov 26 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-7 - Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559) * Tue Nov 12 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-6 - add missing XSA-299 patches * Tue Nov 12 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-5 - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] * Thu Oct 31 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-4 - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443) * Thu Oct 03 2019 Miro Hrončok <mhroncok@redhat.com> - 4.12.1-3 - Rebuilt for Python 3.8.0rc1 (#1748018) * Mon Aug 19 2019 Miro Hrončok <mhroncok@redhat.com> - 4.12.1-2 - Rebuilt for Python 3.8 * Fri Aug 09 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.1-1 - update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch * Sat Jul 27 2019 Fedora Release Engineering <releng@fedoraproject.org> - 4.12.0-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Wed Jun 19 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.0-4 - Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms * Tue Jun 18 2019 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - Fix build with python3.8 (#1704807) * Sat Jun 01 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.0-3 - fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround * Tue May 14 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.0-2 - Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0 * Fri Apr 05 2019 Michael Young <m.a.young@durham.ac.uk> - 4.12.0-1 - update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches * Tue Mar 05 2019 Michael Young <m.a.young@durham.ac.uk> - 4.11.1-4 - xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348] * Thu Feb 14 2019 Michael Young <m.a.young@durham.ac.uk> - 4.11.1-3 - add gcc9 build fixes (#1676229) * Sun Feb 03 2019 Fedora Release Engineering <releng@fedoraproject.org> - 4.11.1-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Tue Dec 11 2018 Michael Young <m.a.young@durham.ac.uk> - 4.11.1-1 - update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651) * Tue Nov 20 2018 Michael Young <m.a.young@durham.ac.uk> - 4.11.0-10 - insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966] * Tue Nov 06 2018 Michael Young <m.a.young@durham.ac.uk> - 4.11.0-9 - guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967] * Wed Oct 24 2018 Michael Young <m.a.young@durham.ac.uk> - 4.11.0-8 - x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)
/usr/lib/.build-id /usr/lib/.build-id/01 /usr/lib/.build-id/01/b5698ab6866941910cd6eeaecc0a30d42a247f /usr/lib/.build-id/0d /usr/lib/.build-id/0d/6c16a61e54f44ba8d6e15e8c5e8ad6de0f9ba6 /usr/lib/.build-id/18 /usr/lib/.build-id/18/da77945e6ac633700550a0a16265e7e4309038 /usr/lib/.build-id/1f /usr/lib/.build-id/1f/44abd10f105b55eef069ab527008c24b8adffe /usr/lib/.build-id/22 /usr/lib/.build-id/22/155f8715ac413bcc706de6ab80b9dbed6f41a5 /usr/lib/.build-id/32 /usr/lib/.build-id/32/ca092ccb2d083662e69ed3fb2044863e7a1915 /usr/lib/.build-id/41 /usr/lib/.build-id/41/46fb852da7299c998b0d33be3dee36abb83eb7 /usr/lib/.build-id/4f /usr/lib/.build-id/4f/09333de4364fab45eca5ddb80dabd98d7fa166 /usr/lib/.build-id/54 /usr/lib/.build-id/54/d9772dd07b2f546c8cba724ba25b4529fb9acf /usr/lib/.build-id/55 /usr/lib/.build-id/55/6712be355b111ec3397ee7fb7f96da5d17209f /usr/lib/.build-id/70 /usr/lib/.build-id/70/ea25b77abaab0a618b1344ba1de07a04b34548 /usr/lib/.build-id/74 /usr/lib/.build-id/74/599d3025e24673242666f11ff320d203365e72 /usr/lib/.build-id/75 /usr/lib/.build-id/75/63b8f5f3b97cdfdb841be7308963abba53dd7c /usr/lib/.build-id/81 /usr/lib/.build-id/81/b3b329f3e7333844eaebafc74c6ef433c2b35b /usr/lib/.build-id/8f /usr/lib/.build-id/8f/9ae5151669b13f7c3fcd635729f53000e7f017 /usr/lib/.build-id/99 /usr/lib/.build-id/99/f1a1fc62d45ebc92eee60c5632f2300d46c9eb /usr/lib/.build-id/9f /usr/lib/.build-id/9f/5736b0d23d0967da1dc3c5e874de7f8ee1bdc2 /usr/lib/.build-id/ac /usr/lib/.build-id/ac/87956ff4f5b987ccbcfb035cc908184740e810 /usr/lib/.build-id/c1 /usr/lib/.build-id/c1/d84daf8eea31d215a96b95098218bb168652c4 /usr/lib/.build-id/d0 /usr/lib/.build-id/d0/522d63ee7718aeea5d3d456555e6dd468f9f7f /usr/lib/.build-id/ea /usr/lib/.build-id/ea/3d0e81a836862aa7191e1bab3856322f54df1b /usr/lib/.build-id/f4 /usr/lib/.build-id/f4/0264f979c1363880ef249e3c8874507eed792f /usr/lib64/libxencall.so.1 /usr/lib64/libxencall.so.1.2 /usr/lib64/libxenctrl.so.4.14 /usr/lib64/libxenctrl.so.4.14.0 /usr/lib64/libxendevicemodel.so.1 /usr/lib64/libxendevicemodel.so.1.3 /usr/lib64/libxenevtchn.so.1 /usr/lib64/libxenevtchn.so.1.1 /usr/lib64/libxenforeignmemory.so.1 /usr/lib64/libxenforeignmemory.so.1.3 /usr/lib64/libxenfsimage.so.4.14 /usr/lib64/libxenfsimage.so.4.14.0 /usr/lib64/libxengnttab.so.1 /usr/lib64/libxengnttab.so.1.2 /usr/lib64/libxenguest.so.4.14 /usr/lib64/libxenguest.so.4.14.0 /usr/lib64/libxenhypfs.so.1 /usr/lib64/libxenhypfs.so.1.0 /usr/lib64/libxenlight.so.4.14 /usr/lib64/libxenlight.so.4.14.0 /usr/lib64/libxenstat.so.4.14 /usr/lib64/libxenstat.so.4.14.0 /usr/lib64/libxenstore.so.3.0 /usr/lib64/libxenstore.so.3.0.3 /usr/lib64/libxentoolcore.so.1 /usr/lib64/libxentoolcore.so.1.0 /usr/lib64/libxentoollog.so.1 /usr/lib64/libxentoollog.so.1.0 /usr/lib64/libxenvchan.so.4.14 /usr/lib64/libxenvchan.so.4.14.0 /usr/lib64/libxlutil.so.4.14 /usr/lib64/libxlutil.so.4.14.0 /usr/lib64/xenfsimage /usr/lib64/xenfsimage/ext2fs-lib /usr/lib64/xenfsimage/ext2fs-lib/fsimage.so /usr/lib64/xenfsimage/fat /usr/lib64/xenfsimage/fat/fsimage.so /usr/lib64/xenfsimage/iso9660 /usr/lib64/xenfsimage/iso9660/fsimage.so /usr/lib64/xenfsimage/reiserfs /usr/lib64/xenfsimage/reiserfs/fsimage.so /usr/lib64/xenfsimage/ufs /usr/lib64/xenfsimage/ufs/fsimage.so /usr/lib64/xenfsimage/zfs /usr/lib64/xenfsimage/zfs/fsimage.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon May 9 17:21:54 2022