xen-ocaml-devel-4.12.2-2.fc31$>E ݳ8}GT5(/>::H?:8d  J  ,<BL  $   k    {      7( d8 l+9 +:+G3H4I4|X4Y4\4]5(^6b7^d8e8f8l8t8u9Dv99999:4Cxen-ocaml-devel4.12.22.fc31Ocaml development libraries for Xen toolsThis package contains libraries for developing ocaml tools to manage Xen virtual machines.^7Lbuildvm-armv7-18.arm.fedoraproject.org1 - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets 4.12.2-2.fc314.12.2-2.fc31libxenbus_stubs.axenbus.axenbus.cmxxenbus.cmxalibxenctrl_stubs.axenctrl.axenctrl.cmxxenctrl.cmxalibxeneventchn_stubs.axeneventchn.axeneventchn.cmxxeneventchn.cmxalibxenlight_stubs.axenlight.axenlight.cmxxenlight.cmxalibxenmmap_stubs.axenmmap.axenmmap.cmxxenmmap.cmxaxenstore.axenstore.cmxxenstore.cmxalibxentoollog_stubs.axentoollog.axentoollog.cmxxentoollog.cmxa/usr/lib/ocaml/xenbus//usr/lib/ocaml/xenctrl//usr/lib/ocaml/xeneventchn//usr/lib/ocaml/xenlight//usr/lib/ocaml/xenmmap//usr/lib/ocaml/xenstore//usr/lib/ocaml/xentoollog/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -march=armv7-a -mfpu=vfpv3-d16 -mtune=generic-armv7-a -mabi=aapcs-linux -mfloat-abi=harddrpmzstd19armv7hl-redhat-linux-gnueabicurrent ar archivehttps://bugz.fedoraproject.org/xenutf-8fbaa89c4bffb492df3e212db57db9539f2e27d776902b7bb71db04e7ba075317?`(/hM8kDLT3xen-ocaml-devel-4.12.1-8.fc31,p2G2>Ksg*$9%h4 2-2 >  A Љ^XP9 <3Y7Rs JaG͗CnMby.'JIRDEZ^'bweEmF.-"\jlk(3o0vBl/zEgs[&8 @ f3{d w/ [궰@Sr%ʪ).fwQp j#bJG>!P<?AqOmF_x@n*UpԢ>~06#+6:>Ftؒ}:jF~ =Q܉6k@M6_Rrs {:8<3+XP(Z* ׶M$ɵqo9wѳDRic.o=O砚#4ʛm YNS*%k͙jSVX^ʨ^"w5q!QYI򇔞$ i+O[YlAZ)_NLQ6G.OLT++w!&40747fa9f4465de943f45d248c979eebaa23962cfb3ae7af2c7a69a8831b041d7ba64188c17fe4390ff61b9745a1d9dc1f5793z,H%Ã<\=itR ~y 6r.J-юg̗1T ѡժ(s*WVJnXkNbS4 >Иv*$Q{17n:j0|gO@£e\A :ya%M,]mvc˱O˜M@ R?$+sY