xen-ocaml-devel-4.12.2-2.fc31$>E6$^6\>::d?:Td  J  (8>D     c    s      +( X8 `+9 +:+G3H4I4pX4Y4\4]5^6b7Rd8e8f8l8t8u9`v999:: :PCxen-ocaml-devel4.12.22.fc31Ocaml development libraries for Xen toolsThis package contains libraries for developing ocaml tools to manage Xen virtual machines.^6buildhw-07.phx2.fedoraproject.orgtFedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectUnspecifiedhttp://xen.org/linuxi686Hu g .H`  - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets 4.12.2-2.fc314.12.2-2.fc31libxenbus_stubs.axenbus.axenbus.cmxxenbus.cmxalibxenctrl_stubs.axenctrl.axenctrl.cmxxenctrl.cmxalibxeneventchn_stubs.axeneventchn.axeneventchn.cmxxeneventchn.cmxalibxenlight_stubs.axenlight.axenlight.cmxxenlight.cmxalibxenmmap_stubs.axenmmap.axenmmap.cmxxenmmap.cmxaxenstore.axenstore.cmxxenstore.cmxalibxentoollog_stubs.axentoollog.axentoollog.cmxxentoollog.cmxa/usr/lib/ocaml/xenbus//usr/lib/ocaml/xenctrl//usr/lib/ocaml/xeneventchn//usr/lib/ocaml/xenlight//usr/lib/ocaml/xenmmap//usr/lib/ocaml/xenstore//usr/lib/ocaml/xentoollog/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectiondrpmzstd19i686-redhat-linux-gnucurrent ar archivehttps://bugz.fedoraproject.org/xenutf-86254eaf6721b66be0c4af96d202c1fe1c92df255c921635e36f9439a8b784c38?`(/h8lDLT3xen-ocaml-devel-4.12.1-8.fc31z5?%|b2f"xu sC=c+2-2 >  A Љ^XP9 <3Y7#O=Nr! ,k̤ .@-t[v1HAugg#gP15.X\XLʢr,Wu2rO(ߣ 7aa18d873c233ff8a34d24e4ac80e2b44feac1378ecfa061ccd362f3c4560ff0184575994274a93b7a8feb561e34ed1dedddav (}U[0_G0@/e|25D)E|w ɨ!2wL~Rk ]b⿵pֲ#_[%`G.ͺY_CDٓS)l/\K^ʒ )˰4(gZ{~5KLz#&M:40|"t\NGbG^=l$hFg?bm`=!"SyxջVY0V 9&wp8}BZh91AY&SYU |A`?3;"* AH Hl IM 驉zOSLzCFPء220CFiF i#IDhP&5=M2h VR>Զr: b ePBD%URK TVcC Hj.E-c`P@VE[D ܊I@$ A ~",_.xsb˜Xg9<C.߿,~>M- sz! a H2K%2c}y9 H? γi :,Fҿin]j7Tr# Y@WUG.p  )(maQ-0a?Ca ^̟B5-fأ, ljA`rdcb s00{>wrcPޙD!