Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: xen-runtime | Distribution: Mageia |
Version: 4.16.1 | Vendor: Mageia.Org |
Release: 1.2.mga8 | Build date: Mon Apr 25 13:22:10 2022 |
Group: System/Kernel and hardware | Build host: localhost |
Size: 31191608 | Source RPM: xen-4.16.1-1.2.mga8.src.rpm |
Packager: ghibo <ghibo> | |
Url: http://xen.org/ | |
Summary: Core Xen runtime environment |
This package contains the runtime programs and daemons which form the core Xen userspace environment.
GPLv2+ and LGPLv2+ and BSD
* Mon Apr 25 2022 ghibo <ghibo> 4.16.1-1.2.mga8 + Revision: 1853449 - Merge patches to fix python scripts to python3 (otherwise /usr/bin/xencons et al. fails). - Remove Source16 and Source17 and cmake from BuildRequires to keep the previous mga original SPEC configuration. - Add Source17 (gmp) so it doesn't try to download during building - Add Source16 (tpm_emulator) so it doesn't try to download during building - Update to release 4.16.1 (more security fixes). - Add cmake to BuildRequires (for vtpm/vtpmmgr). - Update xen.hypervisor.config and xen.hypervisor.config.debug for newer kernel entries. + tv <tv> - 4.16.0 - sync with Cauldron's package - Move /lib/xenfsimage into library package - don't build qemu-traditional or pv-grub by default (following upstream) - fix some incorrect dependencies on building qemu-traditional - rework seabios configure logic (bios.bin is no longer useful) - unpackage /boot/EFI/EFI/mageia/xen*.efi - frontends vulnerable to backends [XSA-376] (document change only) - change grub module package dependencies from Suggests to Recommends and move to hypervisor package - Linux: display frontend "be-alloc" mode is unsupported (comment only) [XSA-363, CVE-2021-26934] (#1929549) - arm: The cache may not be cleaned for newly allocated scrubbed pages [XSA-364, CVE-2021-26933] (#1929547) - backport upstream zstd dom0 and guest patches - BR libzstd - add weak dependency on grub modules to improve initial boot setup - IRQ vector leak on x86 [XSA-360] * Mon Dec 21 2020 tv <tv> 4.14.1-1.mga8 + Revision: 1662465 - update to 4.14.1 * Wed Dec 16 2020 tv <tv> 4.14.0-11.mga8 + Revision: 1658002 - xenstore watch notifications lacking permission checks [XSA-115, CVE-2020-29480] (rhbz#1908091) - Xenstore: new domains inheriting existing node permissions [XSA-322, CVE-2020-29481] (rhbz#1908095) - Xenstore: wrong path length check [XSA-323, CVE-2020-29482] (rhbz#1908096) - Xenstore: guests can crash xenstored via watchs [XSA-324, CVE-2020-29484] (rhbz#1908088) - Xenstore: guests can disturb domain cleanup [XSA-325, CVE-2020-29483] (rhbz#1905648) - oxenstored memory leak in reset_watches [XSA-330, CVE-2020-29485] (rhbz#1908000) - undue recursion in x86 HVM context switch code [XSA-348, CVE-2020-29566] (rhbz#1908085) - oxenstored: node ownership can be changed by unprivileged clients [XSA-352, CVE-2020-29486] (rhbz#1908002) - oxenstored: permissions not checked on root node [XSA-353, CVE-2020-29479] (rhbz#1908003) - infinite loop when cleaning up IRQ vectors [XSA-356, CVE-2020-29567] (rhbz#1907932) - FIFO event channels control block related ordering [XSA-358, CVE-2020-29570] (rhbz#1907931) - FIFO event channels control structure ordering [XSA-359, CVE-2020-29571] (rhbz#1908089) - Work around another gcc-11 stringop-overflow diagnostic * Wed Nov 25 2020 tv <tv> 4.14.0-10.mga8 + Revision: 1649191 - stack corruption from XSA-346 change [XSA-355] * Mon Nov 23 2020 tv <tv> 4.14.0-9.mga8 + Revision: 1648810 - Support zstd compressed kernels (dom0 only) based on linux kernel code * Wed Nov 11 2020 tv <tv> 4.14.0-8.mga8 + Revision: 1644447 - Information leak via power sidechannel [XSA-351, CVE-2020-28368] (#1897146) * Wed Nov 04 2020 tv <tv> 4.14.0-7.mga8 + Revision: 1642581 - revised patch for XSA-286 (mitigating performance impact) - Work around gcc-11 stringop-overflow diagnostics as well * Thu Oct 29 2020 tv <tv> 4.14.0-6.1.mga8 + Revision: 1640521 - updage grub2 config when (un)installing hypervisor - x86 PV guest INVLPG-like flushes may leave stale TLB entries [XSA-286, CVE-2020-27674] (#1891092) - some fixes for gcc 11 - switch to systemd macros, use them in the sub pkgs - drop the requires on grub (useless) - drop the requires on kmod (already in basesystem) - drop obsolete BR on texi2html ghostscript tetex-latex - requires kpartx - fix license * Wed Oct 21 2020 tv <tv> 4.14.0-5.mga8 + Revision: 1637766 - create a xen-licenses collecting all sub licenses - split runtime in order to minimize deps - add xen-hypervisor-abi provides - do not hard requires the full qemu stack (deps!) * Tue Oct 20 2020 tv <tv> 4.14.0-4.mga8 + Revision: 1637400 - x86: Race condition in Xen mapping code [XSA-345] - undue deferral of IOMMU TLB flushes [XSA-346] - unsafe AMD IOMMU page table updates [XSA-347] - do not require non existing kernel-server on arm * Wed Sep 23 2020 tv <tv> 4.14.0-3.mga8 + Revision: 1629525 - x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (rhbz#1881619) - Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (rhbz#1881616) - race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (rhbz#1881618) - PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (rhbz#1881587) - once valid event channels may not turn invalid [XSA-338, CVE-2020-25597] (rhbz#1881588) - x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596] (rhbz#1881617) - Missing memory barriers when accessing/allocating an event channel [XSA-340, CVE-2020-25603] (rhbz#1881583) - out of bounds event channels available to 32-bit x86 domains [XSA-342, CVE-2020-25600] (rhbz#1881582) - races with evtchn_reset() [XSA-343, CVE-2020-25599] (rhbz#1881581) - lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344, CVE-2020-25601] (rhbz#1881586) * Tue Aug 25 2020 tv <tv> 4.14.0-2.mga8 + Revision: 1618903 - QEMU: usb: out-of-bounds r/w access issue [XSA-335, CVE-2020-14364] (rhbz#1871850) * Sat Aug 01 2020 tv <tv> 4.14.0-1.mga8 + Revision: 1610277 - update to 4.14.0 remove or adjust patches now included or superceded upstream adjust xen.hypervisor.config bison and flex packages now needed for hypervisor build /usr/bin/vchan-socket-proxy and /usr/sbin/xenhypfs have been added with associated libraries and man page - revise documentation build dependencies drop tex, texinfo, ghostscript, graphviz, discount add perl(Pod::Html) perl(File::Find) - additional build dependency for ocaml on perl(Data::Dumper) * Wed Jul 08 2020 tv <tv> 4.13.1-3.mga8 + Revision: 1603032 - incorrect error handling in event channel port allocation leads to DoS [XSA-317, CVE-2020-15566] (#1854465) - inverted code paths in x86 dirty VRAM tracking leads to DoS [XSA-319, CVE-2020-15563] (#1854463) - xen: insufficient cache write-back under VT-d leads to DoS [XSA-321, CVE-2020-15565] (#1854467) - missing alignment check in VCPUOP_register_vcpu_info leads to DoS [XSA-327, CVE-2020-15564] (#1854458) - non-atomic modification of live EPT PTE leads to DoS [XSA-328, CVE-2020-15567] (#1854464) * Thu Jun 11 2020 tv <tv> 4.13.1-2.mga8 + Revision: 1592274 - Special Register Buffer speculative side channel [XSA-320] * Tue May 19 2020 tv <tv> 4.13.1-1.mga8 + Revision: 1586256 - update to 4.13.1 * Wed May 06 2020 tv <tv> 4.13.0-21.mga8 + Revision: 1581249 - force gcc >= 10 - build aarch64 hypervisor with -mno-outline-atomics to fix gcc 10 build
/etc/bash_completion.d/xl /etc/logrotate.d/xen /etc/sysconfig/xencommons /etc/xen /etc/xen/cpupool /etc/xen/scripts /etc/xen/scripts/block /etc/xen/scripts/block-common.sh /etc/xen/scripts/block-drbd-probe /etc/xen/scripts/block-dummy /etc/xen/scripts/block-enbd /etc/xen/scripts/block-iscsi /etc/xen/scripts/block-nbd /etc/xen/scripts/block-tap /etc/xen/scripts/colo-proxy-setup /etc/xen/scripts/external-device-migrate /etc/xen/scripts/hotplugpath.sh /etc/xen/scripts/launch-xenstore /etc/xen/scripts/locking.sh /etc/xen/scripts/logging.sh /etc/xen/scripts/remus-netbuf-setup /etc/xen/scripts/vif-bridge /etc/xen/scripts/vif-common.sh /etc/xen/scripts/vif-nat /etc/xen/scripts/vif-openvswitch /etc/xen/scripts/vif-route /etc/xen/scripts/vif-setup /etc/xen/scripts/vscsi /etc/xen/scripts/xen-hotplug-common.sh /etc/xen/scripts/xen-network-common.sh /etc/xen/scripts/xen-script-common.sh /etc/xen/xl.conf /etc/xen/xlexample.hvm /etc/xen/xlexample.pvhlinux /etc/xen/xlexample.pvlinux /usr/bin/pygrub /usr/bin/qemu-img-xen /usr/bin/qemu-nbd-xen /usr/bin/vchan-socket-proxy /usr/bin/xen-cpuid /usr/bin/xen-detect /usr/bin/xenalyze /usr/bin/xencov_split /usr/bin/xenstore /usr/bin/xenstore-chmod /usr/bin/xenstore-control /usr/bin/xenstore-exists /usr/bin/xenstore-list /usr/bin/xenstore-ls /usr/bin/xenstore-read /usr/bin/xenstore-rm /usr/bin/xenstore-watch /usr/bin/xenstore-write /usr/bin/xentrace_format /usr/lib/.build-id /usr/lib/.build-id/00 /usr/lib/.build-id/00/3a65179496590a77745a386793822ea393bcf1 /usr/lib/.build-id/04 /usr/lib/.build-id/04/bcc929fd49b36de712c5f03eb411693601e9dd /usr/lib/.build-id/06 /usr/lib/.build-id/06/bf4f65e49e4f2517a1cb7cf5679fe81251b84b /usr/lib/.build-id/09 /usr/lib/.build-id/09/22809b9c59468cab0479b67932ac5497c61289 /usr/lib/.build-id/0d /usr/lib/.build-id/0d/862f0f31eb1a3e3fd02033e099c1fc05a8b3da /usr/lib/.build-id/0d/ecfcaa364e16e75c82ce245567a5e64fe04410 /usr/lib/.build-id/19 /usr/lib/.build-id/19/88c48e860d09727d0d99fd328c293852f5d4ea /usr/lib/.build-id/21 /usr/lib/.build-id/21/e61f0abe2df95273b22867571c69d5854859a5 /usr/lib/.build-id/27/e832a9024a29b53eb6b66c527fed05a49a5e48 /usr/lib/.build-id/31 /usr/lib/.build-id/31/91e376330e05fbd129c808ad82bf6a0be674f3 /usr/lib/.build-id/33 /usr/lib/.build-id/33/ca56b1a4711eb0b42a9e9d9025a3bba75091d6 /usr/lib/.build-id/36 /usr/lib/.build-id/36/7b387accc148f9082e2115f94e40a2bb1b02c4 /usr/lib/.build-id/38 /usr/lib/.build-id/38/8adc457b05f5fe2db1e660895b5a1dd458373c /usr/lib/.build-id/3a /usr/lib/.build-id/3a/ac6da007340d3cee1837c9a5e741bef2cacfad /usr/lib/.build-id/3e /usr/lib/.build-id/3e/087dd4e7768393479c2b79e7506bbc6e86bfa0 /usr/lib/.build-id/40 /usr/lib/.build-id/40/9296b4a74b1dc17aa561edf078e999b97d56f5 /usr/lib/.build-id/41 /usr/lib/.build-id/41/ab3d381536dce398346ecd8b9f07429a74a6a0 /usr/lib/.build-id/41/ad3ace4f121fd0cd5f07dd004d6c509771e9ba /usr/lib/.build-id/42 /usr/lib/.build-id/42/3110aab4c6702f30be2d93e3d4ac724071f505 /usr/lib/.build-id/46 /usr/lib/.build-id/46/d247a45104e5097633a94ad801d90ffbb2dbda /usr/lib/.build-id/48 /usr/lib/.build-id/48/5e9c4be04d3627aa4c76a090556970be096012 /usr/lib/.build-id/58 /usr/lib/.build-id/58/25b1d084be2e52441dc94ad1604cc067672589 /usr/lib/.build-id/60/1cac93e63275e3e59822e3ce8643af1b40c410 /usr/lib/.build-id/60/4fad5714c9a28e15c127a690641964d4228f0c /usr/lib/.build-id/68 /usr/lib/.build-id/68/d44263f3d5a79247621b03323403f95efb1f88 /usr/lib/.build-id/6f /usr/lib/.build-id/6f/106a4fda57d74d25723548335411012bcb1c00 /usr/lib/.build-id/72 /usr/lib/.build-id/72/0fee147076d239d84a54a07db9986f31504e00 /usr/lib/.build-id/73 /usr/lib/.build-id/73/1b75d88719960492412e5df36a64d52cb41c49 /usr/lib/.build-id/73/347b99b28af3c80747ac8c5f6dad0a8df04bd7 /usr/lib/.build-id/7a /usr/lib/.build-id/7a/d9b3cf9b1d85a37a04cbb65096d2a78e19ee53 /usr/lib/.build-id/8c /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.1 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.2 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.3 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.4 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.5 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.6 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.7 /usr/lib/.build-id/8c/34f08de05e22c39170a59ec0dfe890c477a72e.8 /usr/lib/.build-id/8c/b9c3fac533d1b56e5da2f56cf55a1290523350 /usr/lib/.build-id/91 /usr/lib/.build-id/91/fb71f7d3ef33220a4051fde7ce06dec5dfeace /usr/lib/.build-id/95 /usr/lib/.build-id/95/3ed57c1c56789d51eb47c2b3fe45d4e5004a90 /usr/lib/.build-id/97/411766e6e775593f1f0f0aabd8708e9a21a4b5 /usr/lib/.build-id/a0 /usr/lib/.build-id/a0/8b5ddb198904018ca358432bbaf0f95491affa /usr/lib/.build-id/a4 /usr/lib/.build-id/a4/3fc0e37e6c6ffb275eeeaee8be0be3e9c20b66 /usr/lib/.build-id/ab /usr/lib/.build-id/ab/7e1f0845e85e43f56620ac3e35b72ea9fd6546 /usr/lib/.build-id/ad /usr/lib/.build-id/ad/d0ae0bee59b51d172c4e7b445c13e9fa10d9be /usr/lib/.build-id/b6 /usr/lib/.build-id/b6/4a344590800ee5fe1a8122f946170af580d281 /usr/lib/.build-id/bb /usr/lib/.build-id/bb/34acb9fde0106fe1aaa82ab394737cd4797e89 /usr/lib/.build-id/bd /usr/lib/.build-id/bd/7f47f614ecebcfeef405e48d37b25e40490493 /usr/lib/.build-id/c2 /usr/lib/.build-id/c2/458d760df20745352f68e4ec0a7646601df5df /usr/lib/.build-id/c8 /usr/lib/.build-id/c8/2b68473869fe409bf838219d432ede5e10ca2e /usr/lib/.build-id/cf /usr/lib/.build-id/cf/ed00adb9d09ffe591dfa6913cf1b7dd5e83dca /usr/lib/.build-id/d0 /usr/lib/.build-id/d0/20dfdc77d12f1b50085be43872626d594b78d8 /usr/lib/.build-id/d1 /usr/lib/.build-id/d1/b4ff917c4c98c532da8cfb1d7508bd00d05f96 /usr/lib/.build-id/d4 /usr/lib/.build-id/d4/3ac5a22d40bccc487cc1fabd8b279696b3004e /usr/lib/.build-id/df /usr/lib/.build-id/df/bb3fe80c06722762e7632e62b79796af8c4102 /usr/lib/.build-id/e0 /usr/lib/.build-id/e0/23ef17d20fb4b8aba926caf8196ee6432e61d1 /usr/lib/.build-id/e0/949b808c7447f46d2e9a5103e2e89f3a7cd513 /usr/lib/.build-id/e0/ea5defa9c97c747785f2f49c12810c8f3b5fc6 /usr/lib/.build-id/eb /usr/lib/.build-id/eb/6bc45b76f0c393665bf1426c78365dc79d057d /usr/lib/.build-id/f0 /usr/lib/.build-id/f0/c3cff961f1d15085b5011bbf16e35cc30a1859 /usr/lib/.build-id/f1 /usr/lib/.build-id/f1/ab3ffb5a4b79b07177c13202f46939a661f2cc /usr/lib/debug/.build-id /usr/lib/debug/.build-id/18 /usr/lib/debug/.build-id/18/8430a7dd442fa682759ed26e926ac2dc105a97 /usr/lib/debug/.build-id/18/8430a7dd442fa682759ed26e926ac2dc105a97.debug /usr/lib/debug/usr/libexec/xen/boot/xen-shim-syms /usr/lib/modules-load.d/xen.conf /usr/lib/systemd/system/proc-xen.mount /usr/lib/systemd/system/var-lib-xenstored.mount /usr/lib/systemd/system/xen-qemu-dom0-disk-backend.service /usr/lib/systemd/system/xen-watchdog.service /usr/lib/systemd/system/xenconsoled.service /usr/lib/systemd/system/xendriverdomain.service /usr/lib/systemd/system/xenstored.service /usr/lib64/python3.8/site-packages/grub /usr/lib64/python3.8/site-packages/grub/ExtLinuxConf.py /usr/lib64/python3.8/site-packages/grub/GrubConf.py /usr/lib64/python3.8/site-packages/grub/LiloConf.py /usr/lib64/python3.8/site-packages/grub/__init__.py /usr/lib64/python3.8/site-packages/grub/__pycache__ /usr/lib64/python3.8/site-packages/grub/__pycache__/ExtLinuxConf.cpython-38.opt-1.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/ExtLinuxConf.cpython-38.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/GrubConf.cpython-38.opt-1.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/GrubConf.cpython-38.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/LiloConf.cpython-38.opt-1.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/LiloConf.cpython-38.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/__init__.cpython-38.opt-1.pyc /usr/lib64/python3.8/site-packages/grub/__pycache__/__init__.cpython-38.pyc /usr/lib64/python3.8/site-packages/pygrub-0.6-py3.8.egg-info /usr/lib64/python3.8/site-packages/xenfsimage.cpython-38-x86_64-linux-gnu.so /usr/lib64/xen /usr/libexec/xen /usr/libexec/xen/bin /usr/libexec/xen/bin/convert-legacy-stream /usr/libexec/xen/bin/depriv-fd-checker /usr/libexec/xen/bin/init-xenstore-domain /usr/libexec/xen/bin/libxl-save-helper /usr/libexec/xen/bin/lsevtchn /usr/libexec/xen/bin/pygrub /usr/libexec/xen/bin/qemu-system-i386 /usr/libexec/xen/bin/readnotes /usr/libexec/xen/bin/test-cpu-policy /usr/libexec/xen/bin/test-resource /usr/libexec/xen/bin/test-tsx /usr/libexec/xen/bin/test-xenstore /usr/libexec/xen/bin/verify-stream-v2 /usr/libexec/xen/bin/xen-init-dom0 /usr/libexec/xen/bin/xenconsole /usr/libexec/xen/bin/xenctx /usr/libexec/xen/bin/xendomains /usr/libexec/xen/bin/xenpaging /usr/libexec/xen/bin/xenpvnetboot /usr/libexec/xen/boot /usr/libexec/xen/boot/hvmloader /usr/libexec/xen/boot/ovmf.bin /usr/libexec/xen/boot/xen-shim /usr/libexec/xen/boot/xenstore-stubdom.gz /usr/libexec/xen/boot/xenstorepvh-stubdom.gz /usr/sbin/flask-get-bool /usr/sbin/flask-getenforce /usr/sbin/flask-label-pci /usr/sbin/flask-loadpolicy /usr/sbin/flask-set-bool /usr/sbin/flask-setenforce /usr/sbin/gdbsx /usr/sbin/xen-access /usr/sbin/xen-diag /usr/sbin/xen-hptool /usr/sbin/xen-hvmcrash /usr/sbin/xen-hvmctx /usr/sbin/xen-kdd /usr/sbin/xen-livepatch /usr/sbin/xen-lowmemd /usr/sbin/xen-mceinj /usr/sbin/xen-memshare /usr/sbin/xen-mfndump /usr/sbin/xen-ucode /usr/sbin/xen-vmtrace /usr/sbin/xenbaked /usr/sbin/xenconsoled /usr/sbin/xencov /usr/sbin/xenhypfs /usr/sbin/xenlockprof /usr/sbin/xenmon /usr/sbin/xenperf /usr/sbin/xenpm /usr/sbin/xenpmd /usr/sbin/xenstored /usr/sbin/xentop /usr/sbin/xentrace /usr/sbin/xentrace_setmask /usr/sbin/xentrace_setsize /usr/sbin/xenwatchdogd /usr/sbin/xl /usr/share/man/man1/xenhypfs.1.xz /usr/share/man/man1/xenstore-chmod.1.xz /usr/share/man/man1/xenstore-ls.1.xz /usr/share/man/man1/xenstore-read.1.xz /usr/share/man/man1/xenstore-write.1.xz /usr/share/man/man1/xenstore.1.xz /usr/share/man/man1/xentop.1.xz /usr/share/man/man1/xentrace_format.1.xz /usr/share/man/man1/xl.1.xz /usr/share/man/man5/xl-disk-configuration.5.xz /usr/share/man/man5/xl-network-configuration.5.xz /usr/share/man/man5/xl-pci-configuration.5.xz /usr/share/man/man5/xl.cfg.5.xz /usr/share/man/man5/xl.conf.5.xz /usr/share/man/man5/xlcpupool.cfg.5.xz /usr/share/man/man7/xen-pci-device-reservations.7.xz /usr/share/man/man7/xen-pv-channel.7.xz /usr/share/man/man7/xen-tscmode.7.xz /usr/share/man/man7/xen-vtpm.7.xz /usr/share/man/man7/xen-vtpmmgr.7.xz /usr/share/man/man7/xl-numa-placement.7.xz /usr/share/man/man8/xentrace.8.xz /var/lib/xen /var/lib/xen/dump /var/lib/xen/images /var/lib/xenstored /var/log/xen /var/log/xen/console /var/run/xenstored
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 14:35:04 2024