Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libxen3.0-4.13.0-4.mga8 RPM for i586

From Mageia Cauldron for i586 / media / core / release

Name: libxen3.0 Distribution: Mageia
Version: 4.13.0 Vendor: Mageia.Org
Release: 4.mga8 Build date: Fri Jan 17 11:58:12 2020
Group: System/Libraries Build host: localhost
Size: 1798180 Source RPM: xen-4.13.0-4.mga8.src.rpm
Packager: pterjan <pterjan>
Url: http://xen.org/
Summary: Libraries for Xen tools
This package contains the libraries needed to run applications
which manage Xen virtual machines.

Provides

Requires

License

GPLv2

Changelog

* Fri Jan 17 2020 pterjan <pterjan> 4.13.0-4.mga8
  + Revision: 1481223
  - Attempt again to fix armv7hl build
  - Attempt to fix armv7hl build
* Wed Jan 15 2020 tv <tv> 4.13.0-2.mga8
  + Revision: 1478033
  - arm: a CPU may speculate past the ERET instruction [XSA-312]
  - add weak requires for perl (/etc/xen/scripts/locking.sh)
* Fri Dec 20 2019 tv <tv> 4.13.0-1.mga8
  + Revision: 1469043
  - update config file
  - update to 4.13.0
  - remove patches now included or superceded upstream
  - adjust xen.hypervisor.config
  - /usr/sbin/xen-tmem-list-parse has been removed
  - pkgconfig files have moved to %{_libdir}/pkgconfig
  - /usr/sbin/xen-ucode has been added (x86 only)
  - fix build with OCaml 4.09.0
* Thu Dec 12 2019 tv <tv> 4.12.1-6.mga8
  + Revision: 1466026
  - denial of service in find_next_bit() [XSA-307, CVE-2019-19581,
    	CVE-2019-19582] (#1782211)
  - denial of service in HVM/PVH guest userspace code [XSA-308,
    	CVE-2019-19583] (#1782206)
  - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578]
    	(#1782210)
  - Further issues with restartable PV type change operations [XSA-310,
    	CVE-2019-19580] (#1782207)
  - vulnerability in dynamic height handling for AMD IOMMU pagetables
    	[XSA-311, CVE-2019-19577] (#1782208)
  - add patches needed to apply XSA-311
* Wed Nov 27 2019 tv <tv> 4.12.1-5.mga8
  + Revision: 1463124
  - Device quarantine for alternate pci assignment methods [XSA-306]
* Wed Nov 13 2019 tv <tv> 4.12.1-4.mga8
  + Revision: 1459858
  - add missing XSA-299 patches
  - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207]
  - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]
* Sun Nov 03 2019 tv <tv> 4.12.1-3.mga8
  + Revision: 1457483
  - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420]
  - missing descriptor table limit checking in x86 PV emulation [XSA-298,
    	CVE-2019-18425]
  - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421]
    	(#1767726)
  - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423]
  - passed through PCI devices may corrupt host memory after deassignment
    	[XSA-302, CVE-2019-18424] (#1767731)
  - ARM: Interrupts are unconditionally unmasked in exception handlers
    	[XSA-303, CVE-2019-18422]
* Sun Sep 15 2019 tv <tv> 4.12.1-2.mga8
  + Revision: 1441507
  - rebuild with new rpm linked perl-URPM
* Fri Aug 09 2019 tv <tv> 4.12.1-1.mga8
  + Revision: 1428475
  - new release
* Thu Jul 04 2019 tv <tv> 4.12.0-3.mga8
  + Revision: 1418400
  - Unlimited Arm Atomics Operations [XSA-295] (#1720760)
  - some debug files are now properly packaged in debuginfo rpms
  - fix HVM DomU boot on some chipsets
  - fix expected FTBFS with Python 3.8 (#1704807)
* Wed May 15 2019 tv <tv> 4.12.0-2.mga7
  + Revision: 1397871
  - Microarchitectural Data Sampling speculative side channel [XSA-297,
    	CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091]
  - additional patches so above applies cleanly
* Sun Apr 14 2019 tv <tv> 4.12.0-1.mga7
  + Revision: 1389949
  - reeable i586 but disable cross compiling hypervisor for now
  - fix filelist for aarch64
  - temporary disable i586
  - update to 4.12.0
  - remove patches for issues now fixed upstream
  - replace xen.use.fedora.ipxe.patch with --with-system-ipxe
  - drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed
  - rediff patches
  - xen.hypervisor.config refresh
  - kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so
    fs libdir is now xenfsimage libdir
  - xen-ringwatch xen-bugtool have been dropped
  - remove remaining traces of efiming and efi_flags logic
  - switch from python2 to python3
* Wed Mar 06 2019 tv <tv> 4.11.1-1.mga7
  + Revision: 1372036
  - enable to disable building docs
  - update to 4.11.1
  - construct ovmf.bin from edk2-ovmf package (rhbz#1656651)
  - xen: various flaws (rhbz#1685577)
    grant table transfer issues on large hosts [XSA-284]
    race with pass-through device hotplug [XSA-285]
    x86: steal_page violates page_struct access discipline [XSA-287]
    x86: Inconsistent PV IOMMU discipline [XSA-288]
    missing preemption in x86 PV page table unvalidation [XSA-290]
    x86/PV: page type reference counting issue with failed IOMMU update [XSA-291]
    x86: insufficient TLB flushing when using PCID [XSA-292]
    x86: PV kernel context switch corruption [XSA-293]
    x86 shadow: Insufficient TLB flushing when using PCID [XSA-294]
    remove patches for issues now fixed upstream
    adjust xen.use.fedora.ipxe.patch
* Thu Nov 22 2018 tv <tv> 4.11.0-9.mga7
  + Revision: 1333165
  - insufficient TLB flushing / improper large page mappings with AMD IOMMUs
    	[XSA-275] (#1651665)
  - x86: DoS from attempting to use INVPCID with a non-canonical addresses
    	[XSA-279] (#1651970)
  - xen: various flaws (#1652251)
    resource accounting issues in x86 IOREQ server handling [XSA-276]
    x86: incorrect error handling for guest p2m page removals [XSA-277]
    Fix for XSA-240 conflicts with shadow paging [XSA-280]
* Wed Nov 07 2018 tv <tv> 4.11.0-8.mga7
  + Revision: 1328822
  - guest use of HLE constructs may lock up host [XSA-282]
* Sat Nov 03 2018 pterjan <pterjan> 4.11.0-7.mga7
  + Revision: 1327850
  - Only require grub on architectures where it exists
  - Kill old Requires on glibc-xen
* Tue Oct 30 2018 tv <tv> 4.11.0-6.mga7
  + Revision: 1326740
  - x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (rhbz#1643118)
* Thu Oct 25 2018 wally <wally> 4.11.0-5.mga7
  + Revision: 1325485
  - fix build on i586
  - update file list for arm/aarch64
  + daviddavid <daviddavid>
  - rebuild for new ocaml 4.07.1
  + tv <tv>
  - set /usr/bin/python2 at the start of another python script
  - reenable EFI images now that we've fixed binutils
  - BR libfdt-devel on arm
* Thu Sep 13 2018 tv <tv> 4.11.0-2.mga7
  + Revision: 1258876
  - temporary unlist missing efi images
  - set properly libexecdir on ix86
  - sync patches with FC
  - fix build on ix86
  - 4.11.0
  - replace use of deprecated brctl command (rhbz#1588712)
  - Speculative register leakage from lazy FPU context switching
* Thu May 31 2018 tv <tv> 4.10.1-2.mga7
  + Revision: 1233265
  - fix build with glibc 2.27
  - Speculative Store Bypass [XSA-263, CVE-2018-3639]
    	(with extra patches so it applies cleanly)
* Wed May 09 2018 tv <tv> 4.10.1-1.mga7
  + Revision: 1227910
  - 4.10.1
  - make doc noarch
* Thu Feb 01 2018 tv <tv> 4.10.0-2.mga7
  + Revision: 1198465
  - try harder to have a cross build for ix86
  - fix ix86 build
  - sync patches with FC
  - new release

Files

/usr/lib/.build-id
/usr/lib/.build-id/02
/usr/lib/.build-id/02/abbe995bdcee71af75457ec315f2e9f151dd80
/usr/lib/.build-id/47
/usr/lib/.build-id/47/8ae7324cbb1f0e874a1cdd9bd2bd2ceafd9df5
/usr/lib/.build-id/68
/usr/lib/.build-id/68/35c1581a97e8908c98fa576b547af556dfbc99
/usr/lib/.build-id/74
/usr/lib/.build-id/74/5a7d12fa2ab0578ab8b92e128c893f8beb4ebd
/usr/lib/.build-id/8a/3bd433e4d2e88f8922ab33ef1123f11b5227fb
/usr/lib/.build-id/94
/usr/lib/.build-id/94/ac78bfa2b42d0e5094ed126cbf2a49c93bd2a1
/usr/lib/.build-id/cc
/usr/lib/.build-id/cc/00a4cf0e9b279b4781ae9ce5983840aa471e13
/usr/lib/.build-id/ce
/usr/lib/.build-id/ce/4a9e38cbfe83bb2713d896b3bd71d7a687cb96
/usr/lib/.build-id/de
/usr/lib/.build-id/de/7dc5fe41ba7fb1df90aaae707a7b62c4377736
/usr/lib/.build-id/e4
/usr/lib/.build-id/e4/62dfc01d456496e88d821df82d6764c67acfc8
/usr/lib/.build-id/eb/d13c40873c01f93fd3276f1ba9f1e64c65fb04
/usr/lib/.build-id/ed/69128928e9b3e6f734b5cc4b78f17abfc6da7b
/usr/lib/.build-id/f1
/usr/lib/.build-id/f1/c61bb681b3fd289222c96c672b7f1e0f9f88a9
/usr/lib/.build-id/f3
/usr/lib/.build-id/f3/0e36f0ef72ccb6386104531b1da86cf2f8b96d
/usr/lib/.build-id/fe
/usr/lib/.build-id/fe/ddca4c8eaab4b5315a1a5d94934a894a3246aa
/usr/lib/libxencall.so.1
/usr/lib/libxencall.so.1.2
/usr/lib/libxenctrl.so.4.13
/usr/lib/libxenctrl.so.4.13.0
/usr/lib/libxendevicemodel.so.1
/usr/lib/libxendevicemodel.so.1.3
/usr/lib/libxenevtchn.so.1
/usr/lib/libxenevtchn.so.1.1
/usr/lib/libxenforeignmemory.so.1
/usr/lib/libxenforeignmemory.so.1.3
/usr/lib/libxenfsimage.so.4.13
/usr/lib/libxenfsimage.so.4.13.0
/usr/lib/libxengnttab.so.1
/usr/lib/libxengnttab.so.1.2
/usr/lib/libxenguest.so.4.13
/usr/lib/libxenguest.so.4.13.0
/usr/lib/libxenlight.so.4.13
/usr/lib/libxenlight.so.4.13.0
/usr/lib/libxenstat.so.4.13
/usr/lib/libxenstat.so.4.13.0
/usr/lib/libxenstore.so.3.0
/usr/lib/libxenstore.so.3.0.3
/usr/lib/libxentoolcore.so.1
/usr/lib/libxentoolcore.so.1.0
/usr/lib/libxentoollog.so.1
/usr/lib/libxentoollog.so.1.0
/usr/lib/libxenvchan.so.4.13
/usr/lib/libxenvchan.so.4.13.0
/usr/lib/libxlutil.so.4.13
/usr/lib/libxlutil.so.4.13.0


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Jan 23 01:41:32 2020