Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: lib64xen3.0 | Distribution: Mageia |
Version: 4.12.1 | Vendor: Mageia.Org |
Release: 1.mga7 | Build date: Wed Nov 27 17:05:30 2019 |
Group: System/Libraries | Build host: localhost |
Size: 1586368 | Source RPM: xen-4.12.1-1.mga7.src.rpm |
Packager: tv <tv> | |
Url: http://xen.org/ | |
Summary: Libraries for Xen tools |
This package contains the libraries needed to run applications which manage Xen virtual machines.
GPLv2
* Wed Nov 27 2019 tv <tv> 4.12.1-1.mga7 + Revision: 1463170 - new release - Device quarantine for alternate pci assignment methods [XSA-306] - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (rhbz#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (rhbz#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (rhbz#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (rhbz#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (rhbz#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (rhbz#1771443) - Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (rhbz#1720760) - fix HVM DomU boot on some chipsets - adjust grub2 workaround * Wed May 15 2019 tv <tv> 4.12.0-2.mga7 + Revision: 1397871 - Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly * Sun Apr 14 2019 tv <tv> 4.12.0-1.mga7 + Revision: 1389949 - reeable i586 but disable cross compiling hypervisor for now - fix filelist for aarch64 - temporary disable i586 - update to 4.12.0 - remove patches for issues now fixed upstream - replace xen.use.fedora.ipxe.patch with --with-system-ipxe - drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed - rediff patches - xen.hypervisor.config refresh - kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir - xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 * Wed Mar 06 2019 tv <tv> 4.11.1-1.mga7 + Revision: 1372036 - enable to disable building docs - update to 4.11.1 - construct ovmf.bin from edk2-ovmf package (rhbz#1656651) - xen: various flaws (rhbz#1685577) grant table transfer issues on large hosts [XSA-284] race with pass-through device hotplug [XSA-285] x86: steal_page violates page_struct access discipline [XSA-287] x86: Inconsistent PV IOMMU discipline [XSA-288] missing preemption in x86 PV page table unvalidation [XSA-290] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291] x86: insufficient TLB flushing when using PCID [XSA-292] x86: PV kernel context switch corruption [XSA-293] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294] remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch * Thu Nov 22 2018 tv <tv> 4.11.0-9.mga7 + Revision: 1333165 - insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276] x86: incorrect error handling for guest p2m page removals [XSA-277] Fix for XSA-240 conflicts with shadow paging [XSA-280] * Wed Nov 07 2018 tv <tv> 4.11.0-8.mga7 + Revision: 1328822 - guest use of HLE constructs may lock up host [XSA-282] * Sat Nov 03 2018 pterjan <pterjan> 4.11.0-7.mga7 + Revision: 1327850 - Only require grub on architectures where it exists - Kill old Requires on glibc-xen * Tue Oct 30 2018 tv <tv> 4.11.0-6.mga7 + Revision: 1326740 - x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (rhbz#1643118) * Thu Oct 25 2018 wally <wally> 4.11.0-5.mga7 + Revision: 1325485 - fix build on i586 - update file list for arm/aarch64 + daviddavid <daviddavid> - rebuild for new ocaml 4.07.1 + tv <tv> - set /usr/bin/python2 at the start of another python script - reenable EFI images now that we've fixed binutils - BR libfdt-devel on arm * Thu Sep 13 2018 tv <tv> 4.11.0-2.mga7 + Revision: 1258876 - temporary unlist missing efi images - set properly libexecdir on ix86 - sync patches with FC - fix build on ix86 - 4.11.0 - replace use of deprecated brctl command (rhbz#1588712) - Speculative register leakage from lazy FPU context switching * Thu May 31 2018 tv <tv> 4.10.1-2.mga7 + Revision: 1233265 - fix build with glibc 2.27 - Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly) * Wed May 09 2018 tv <tv> 4.10.1-1.mga7 + Revision: 1227910 - 4.10.1 - make doc noarch * Thu Feb 01 2018 tv <tv> 4.10.0-2.mga7 + Revision: 1198465 - try harder to have a cross build for ix86 - fix ix86 build - sync patches with FC - new release
/usr/lib/.build-id /usr/lib/.build-id/01 /usr/lib/.build-id/01/0361754b9a4a845598e66dbd417b8043030eeb /usr/lib/.build-id/03 /usr/lib/.build-id/03/187bf72ff98894b68a0dfcf814909a9e8b9247 /usr/lib/.build-id/0d /usr/lib/.build-id/0d/5e3984abbd71be266e6bf67c48fb373bbad1be /usr/lib/.build-id/0f/3f2620d48b99b8c775e701c15e2d3fd0fd28be /usr/lib/.build-id/13 /usr/lib/.build-id/13/561ea0c12054131d7e1505da8741005709eba3 /usr/lib/.build-id/24 /usr/lib/.build-id/24/a85215be83625e1e0c375887af9014a0fbd9bc /usr/lib/.build-id/2d /usr/lib/.build-id/2d/488fc7c140779735b3bdd0b6fb585c10deea0e /usr/lib/.build-id/4a /usr/lib/.build-id/4a/2d1f4af3b525dc7825c7783ff3caac0e3aa0d5 /usr/lib/.build-id/6d /usr/lib/.build-id/6d/35763f5bc74d58057aaf0139c1d447baad5a25 /usr/lib/.build-id/78/9fd2c42df5dbdc7d80d0f093aa1c6cce99acc5 /usr/lib/.build-id/85 /usr/lib/.build-id/85/7bd44448e8c6891e39d2db3168286b0c5d13c0 /usr/lib/.build-id/8c /usr/lib/.build-id/8c/d8fdf68772d7eb687623a5e4b77445fdebcbd1 /usr/lib/.build-id/a8 /usr/lib/.build-id/a8/5c2bc6fce9c5d587ba4c0add7a07b9c5bc1847 /usr/lib/.build-id/d4 /usr/lib/.build-id/d4/599a51f095b8d1d06f805027a4193296ad7663 /usr/lib/.build-id/f0 /usr/lib/.build-id/f0/b0a877f18f107b7f382de484e59d010ac6641e /usr/lib64/libxencall.so.1 /usr/lib64/libxencall.so.1.2 /usr/lib64/libxenctrl.so.4.12 /usr/lib64/libxenctrl.so.4.12.0 /usr/lib64/libxendevicemodel.so.1 /usr/lib64/libxendevicemodel.so.1.3 /usr/lib64/libxenevtchn.so.1 /usr/lib64/libxenevtchn.so.1.1 /usr/lib64/libxenforeignmemory.so.1 /usr/lib64/libxenforeignmemory.so.1.3 /usr/lib64/libxenfsimage.so.4.12 /usr/lib64/libxenfsimage.so.4.12.0 /usr/lib64/libxengnttab.so.1 /usr/lib64/libxengnttab.so.1.2 /usr/lib64/libxenguest.so.4.12 /usr/lib64/libxenguest.so.4.12.0 /usr/lib64/libxenlight.so.4.12 /usr/lib64/libxenlight.so.4.12.0 /usr/lib64/libxenstat.so.4.12 /usr/lib64/libxenstat.so.4.12.0 /usr/lib64/libxenstore.so.3.0 /usr/lib64/libxenstore.so.3.0.3 /usr/lib64/libxentoolcore.so.1 /usr/lib64/libxentoolcore.so.1.0 /usr/lib64/libxentoollog.so.1 /usr/lib64/libxentoollog.so.1.0 /usr/lib64/libxenvchan.so.4.12 /usr/lib64/libxenvchan.so.4.12.0 /usr/lib64/libxlutil.so.4.12 /usr/lib64/libxlutil.so.4.12.0
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon May 9 12:10:11 2022