Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libxen3.0 | Distribution: Mageia |
Version: 4.18.0 | Vendor: Mageia.Org |
Release: 5.mga10 | Build date: Fri Feb 9 20:40:50 2024 |
Group: System/Libraries | Build host: localhost |
Size: 2035505 | Source RPM: xen-4.18.0-5.mga10.src.rpm |
Packager: ghibo <ghibo> | |
Url: https://xen.org/ | |
Summary: Libraries for Xen tools |
This package contains the libraries needed to run applications which manage Xen virtual machines.
GPLv2+ and LGPLv2+ and BSD
* Fri Feb 09 2024 ghibo <ghibo> 4.18.0-5.mga10 + Revision: 2039996 - Sync with FC. - Add security patch XSA-447 (CVE-2023-46837). - Add security patch XSA-449 (CVE-2023-46839). - Add security patch XSA-450 (CVE-2023-46840). - Disable lto. - Refresh configs. * Thu Dec 28 2023 daviddavid <daviddavid> 4.18.0-4.mga10 + Revision: 2023086 - rebuild for py3.12 * Thu Dec 07 2023 tv <tv> 4.18.0-3.mga10 + Revision: 2014712 - Use %arm with %ifarch in order to try to fix getting libfdt installed on BS * Wed Dec 06 2023 tv <tv> 4.18.0-2.mga10 + Revision: 2013814 - Try to get it to build on armv7hl * Tue Dec 05 2023 tv <tv> 4.18.0-1.mga10 + Revision: 2013372 - Revert "%patch N" -> %patch as BS is too old - update to xen-4.18.0 - xencons has been dropped * Tue Aug 29 2023 ghibo <ghibo> 4.17.1-1.mga10 + Revision: 1980905 - Update to release 4.17.1. - Add Patch48 (XSA-431/CVE-2022-42336) from upstream. - Pass missed CFLAGS/CXXFLAGS. - Drop patches 501, 502, 503, included upstream. - Add Patch505 from opensuse. - Add Patch600 (stubdom) from aur. - Drop Patch205 and add vtpm-gcc12-fixes as Source18 Patch. * Wed Feb 22 2023 ghibo <ghibo> 4.17.0-4.mga9 + Revision: 1944624 - Add support for vtpm for x86_64 * Tue Feb 21 2023 ghibo <ghibo> 4.17.0-3.mga9 + Revision: 1944606 - Fix xen.hypervisor.config with new CONFIGs to avoid EOF errors. - Merge patch from opensuse (and upstream) to avoid overflow for CPUs over 4.294GHz. - Merge patch from opensuse (and upstream) to fix problems with arch LBR in newer CPUs like Sapphire Rapids. * Tue Feb 21 2023 tv <tv> 4.17.0-2.mga9 + Revision: 1944522 - update to xen-4.17.0 - use OVMF.fd from new edk2-ovmf-xen package as ovmf.bin file built from edk2-ovmf package no longer supports xen (#2170930) - x86: Cross-Thread Return Address Predictions [XSA-426, CVE-2022-27672] - Guests can cause Xenstore crash via soft reset [XSA-425, CVE-2022-42330] * Wed Nov 09 2022 tv <tv> 4.16.2-1.mga9 + Revision: 1904864 - update to xen-4.16.2 + tons of CVEs * Fri Jul 08 2022 tv <tv> 4.16.1-4.mga9 + Revision: 1868019 - Linux disk/nic frontends data leaks [XSA-403, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742] (#2104747) * Wed Jun 29 2022 tv <tv> 4.16.1-3.mga9 + Revision: 1866672 - x86: MMIO Stale Data vulnerabilities [XSA-404, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166] - x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362] - x86 pv: Insufficient care with non-coherent mappings [ XSA-402, CVE-2022-26363, CVE-2022-26364] - additional patches so above applies cleanly * Thu May 19 2022 pterjan <pterjan> 4.16.1-2.mga9 + Revision: 1859023 - Rebuild for OCaml 4.14 * Fri Apr 15 2022 tv <tv> 4.16.1-1.mga9 + Revision: 1850236 - update to xen-4.16.1 - strip .efi file to help EFI partitions with limited space * Wed Apr 06 2022 tv <tv> 4.16.0-7.mga9 + Revision: 1846236 - Racy interactions between dirty vram tracking and paging log dirty hypercalls [XSA-397, CVE-2022-26356] - race in VT-d domain ID cleanup [XSA-399, CVE-2022-26357] - IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues [XSA-400, CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361] - additional patches so above applies cleanly * Tue Mar 22 2022 tv <tv> 4.16.0-6.mga9 + Revision: 1817555 - Fix filelist on armv7hl * Tue Mar 22 2022 tv <tv> 4.16.0-5.mga9 + Revision: 1816807 - Reenable EFI build & cross-compiling on ia32 - fix build of xen*.efi file and package it in /usr/lib*/efi - Use -Wno-error=use-after-free for gcc12 * Wed Mar 16 2022 tv <tv> 4.16.0-4.mga9 + Revision: 1794756 - Multiple speculative security issues [XSA-398] - additional patches so above applies cleanly * Mon Feb 14 2022 tv <tv> 4.16.0-3.mga9 + Revision: 1774873 - Disable docs for now - arm: guest_physmap_remove_page not removing the p2m mappings [XSA-393, CVE-2022-23033] (#2045044) - A PV guest could DoS Xen while unmapping a grant [XSA-394, CVE-2022-23034] (#2045042) - Insufficient cleanup of passed-through device IRQs [XSA-395, CVE-2022-23035] (#2045040) + tmb <tmb> - rebuild for python 3.10
/usr/lib/.build-id /usr/lib/.build-id/07 /usr/lib/.build-id/07/ef86bbedfa11750c4dddb2a67e8e283ab48c08 /usr/lib/.build-id/18 /usr/lib/.build-id/18/cfc87c4bf40b8aaa46b0d76033ac3085a1b248 /usr/lib/.build-id/27 /usr/lib/.build-id/27/b0db53387c9e7ed1b935aea47e3071f2629650 /usr/lib/.build-id/2d /usr/lib/.build-id/2d/c77d5b8661e8caf7d7da59ca45a3fb0b761bdd /usr/lib/.build-id/34 /usr/lib/.build-id/34/3beddb0153398aa09baf20241ca9db708b35ee /usr/lib/.build-id/3e /usr/lib/.build-id/3e/43226096d1647186a10740bbc1f294549847ce /usr/lib/.build-id/4b /usr/lib/.build-id/4b/4e5e06e1729b4c3e53b77be6a97d0f8618051c /usr/lib/.build-id/54 /usr/lib/.build-id/54/98238907c5898a27d3d055e485fcc09ccada0b /usr/lib/.build-id/64 /usr/lib/.build-id/64/aadde4e22cfb11df1c93a4880cdabc9d03e3d2 /usr/lib/.build-id/6f /usr/lib/.build-id/6f/5776e34d7648cf7a923c2bd44409fb7f712f03 /usr/lib/.build-id/70 /usr/lib/.build-id/70/48259d6e5b7564e5426491f19cc3ce6b5e9a50 /usr/lib/.build-id/7d /usr/lib/.build-id/7d/a41e13f59e8010b5115ab6d169c1c9935edc6e /usr/lib/.build-id/86 /usr/lib/.build-id/86/467c2703fc0498ba5359e968c90433dde03d3b /usr/lib/.build-id/87 /usr/lib/.build-id/87/863e155f7fad90850acaffbaac40c8be60f7bd /usr/lib/.build-id/96 /usr/lib/.build-id/96/e82713d95207d71ab5afbf07667baf045950eb /usr/lib/.build-id/b7 /usr/lib/.build-id/b7/10f7ed0dbc20e836116c6b067a9bdc061c7584 /usr/lib/.build-id/bd /usr/lib/.build-id/bd/ce62700394fa3a9b3644e54980bef18449b8a7 /usr/lib/.build-id/c0 /usr/lib/.build-id/c0/553dce277333cafd0340d3de6b4873bd4b1897 /usr/lib/.build-id/c3 /usr/lib/.build-id/c3/2eb7df128028fd3b3d52d3482e187b911187d4 /usr/lib/.build-id/cb /usr/lib/.build-id/cb/87fbefca0a1bd8344f52d005edaee1a699e744 /usr/lib/.build-id/e0 /usr/lib/.build-id/e0/a74bc91d7a5bd8536ce1359844e0ea7f61e48d /usr/lib/.build-id/f6 /usr/lib/.build-id/f6/5581d8689d50d250a837a4c188ffecf93ca3d0 /usr/lib/.build-id/f6/addc853c13cf34523e98447f61c651b6eae7e9 /usr/lib/libxencall.so.1 /usr/lib/libxencall.so.1.3 /usr/lib/libxenctrl.so.4.18 /usr/lib/libxenctrl.so.4.18.0 /usr/lib/libxendevicemodel.so.1 /usr/lib/libxendevicemodel.so.1.4 /usr/lib/libxenevtchn.so.1 /usr/lib/libxenevtchn.so.1.2 /usr/lib/libxenforeignmemory.so.1 /usr/lib/libxenforeignmemory.so.1.4 /usr/lib/libxenfsimage.so.4.18 /usr/lib/libxenfsimage.so.4.18.0 /usr/lib/libxengnttab.so.1 /usr/lib/libxengnttab.so.1.2 /usr/lib/libxenguest.so.4.18 /usr/lib/libxenguest.so.4.18.0 /usr/lib/libxenhypfs.so.1 /usr/lib/libxenhypfs.so.1.0 /usr/lib/libxenlight.so.4.18 /usr/lib/libxenlight.so.4.18.0 /usr/lib/libxenstat.so.4.18 /usr/lib/libxenstat.so.4.18.0 /usr/lib/libxenstore.so.4 /usr/lib/libxenstore.so.4.0 /usr/lib/libxentoolcore.so.1 /usr/lib/libxentoolcore.so.1.0 /usr/lib/libxentoollog.so.1 /usr/lib/libxentoollog.so.1.0 /usr/lib/libxenvchan.so.4.18 /usr/lib/libxenvchan.so.4.18.0 /usr/lib/libxlutil.so.4.18 /usr/lib/libxlutil.so.4.18.0 /usr/lib/xenfsimage /usr/lib/xenfsimage/ext2fs-lib /usr/lib/xenfsimage/ext2fs-lib/fsimage.so /usr/lib/xenfsimage/fat /usr/lib/xenfsimage/fat/fsimage.so /usr/lib/xenfsimage/iso9660 /usr/lib/xenfsimage/iso9660/fsimage.so /usr/lib/xenfsimage/reiserfs /usr/lib/xenfsimage/reiserfs/fsimage.so /usr/lib/xenfsimage/ufs /usr/lib/xenfsimage/ufs/fsimage.so /usr/lib/xenfsimage/xfs /usr/lib/xenfsimage/xfs/fsimage.so /usr/lib/xenfsimage/zfs /usr/lib/xenfsimage/zfs/fsimage.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Oct 6 11:18:19 2024