xen-ocaml-devel-4.12.2-2.fc31$>E M=s?eS%(v+>::L?:<d  J  (8>H      g    w      /( \8 d+9 +:+G3H4I4tX4Y4\4]5 ^6b7dd8e8f8l8t8u9Hv99999:8Cxen-ocaml-devel4.12.22.fc31Ocaml development libraries for Xen toolsThis package contains libraries for developing ocaml tools to manage Xen virtual machines.^6buildhw-09.phx2.fedoraproject.org xFedora ProjectFedora ProjectGPLv2+ and LGPLv2+ and BSDFedora ProjectUnspecifiedhttp://xen.org/linuxx86_64Uɶ0g 9  j.4 v (6(A!ǁ^8G^8G^7Z^7Z^8G^8G^7Y^7Y^8G^8G^7Y^7Y^8G^8G^7^^7^^8G^8G^7W^7W^8G^7[^7[^8G^8G^7X^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-4.12.2-2.fc31.src.rpmxen-ocaml-develxen-ocaml-devel(x86-64)    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)xen-ocaml3.0.4-14.6.0-14.0-15.4.18-14.12.2-2.fc314.15.1^@^!@]@]]ʞ]ʞ]]]Z@]M`@]<<] #]@\h\ڭ\C@\~d\eX@\V\[@[@[^[[[[~[v[r@[r@[GB[3|@[#@[@Z@ZZmZw@ZZZ@Z}@ZvMichael Young - 4.12.2-2Michael Young - 4.12.2-1Michael Young - 4.12.1-8Michael Young - 4.12.1-7Michael Young - 4.12.1-6Michael Young - 4.12.1-5Michael Young - 4.12.1-4Miro Hrončok - 4.12.1-3Miro Hrončok - 4.12.1-2Michael Young - 4.12.1-1Fedora Release Engineering - 4.12.0-5Michael Young - 4.12.0-4Zbigniew Jędrzejewski-Szmek Michael Young - 4.12.0-3Michael Young - 4.12.0-2Michael Young - 4.12.0-1Michael Young - 4.11.1-4Michael Young - 4.11.1-3Fedora Release Engineering - 4.11.1-2Michael Young - 4.11.1-1Michael Young - 4.11.0-10Michael Young - 4.11.0-9Michael Young - 4.11.0-8Michael Young - 4.11.0-7Michael Young - 4.11.0-6Michael Young Michael Young - 4.11.0-5Michael Young - 4.11.0-4Michael Young - 4.11.0-3Michael Young - 4.11.0-2Michael Young - 4.11.0-1Michael Young - 4.10.1-5Michael Young - 4.10.1-4Michael Young - 4.10.1-3Michael Young - 4.10.1-2Michael Young - 4.10.1-1Michael Young - 4.10.0-9Michael Young - 4.10.0-8Michael Young - 4.10.0-7Michael Young - 4.10.0-6Michael Young Igor Gnatenko - 4.10.0-5Igor Gnatenko - 4.10.0-4- arm: a CPU may speculate past the ERET instruction [XSA-312]- update to 4.12.2 remove patches for issues now fixed upstream- denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311- Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559)- add missing XSA-299 patches- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443)- Rebuilt for Python 3.8.0rc1 (#1748018)- Rebuilt for Python 3.8- update to 4.12.1 remove patches for issues now fixed upstream adjust xen.gcc9.fixes.patch- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) - some debug files are now properly packaged in debuginfo rpms- Fix build with python3.8 (#1704807)- fix HVM DomU boot on some chipsets - fix expected FTBFS with Python 3.8 (#1704807) - adjust grub2 workaround- Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0- update to 4.12.0 (#1694695) remove patches for issues now fixed upstream replace xen.use.fedora.ipxe.patch with --with-system-ipxe drop xen.glibcfix.patch xen.gcc8.temp.fix.patch which are no longer needed adjust xen.python.env.patch xen.gcc9.fixes.patch xen.hypervisor.config refresh kdd is now xen-kdd, xenmon.py is now xenmon, fsimage.so is now xenfsimage.so fs libdir is now xenfsimage libdir xen-ringwatch xen-bugtool have been dropped - remove remaining traces of efiming and efi_flags logic - switch from python2 to python3 - drop systemd_postun and renumber patches- xen: various flaws (#1685577) grant table transfer issues on large hosts [XSA-284, CVE-2019-17340] race with pass-through device hotplug [XSA-285, CVE-2019-17341] x86: steal_page violates page_struct access discipline [XSA-287, CVE-2019-17342] x86: Inconsistent PV IOMMU discipline [XSA-288, CVE-2019-17343] missing preemption in x86 PV page table unvalidation [XSA-290, CVE-2019-17344] x86/PV: page type reference counting issue with failed IOMMU update [XSA-291, CVE-2019-17345] x86: insufficient TLB flushing when using PCID [XSA-292, CVE-2019-17346] x86: PV kernel context switch corruption [XSA-293, CVE-2019-17347] x86 shadow: Insufficient TLB flushing when using PCID [XSA-294, CVE-2019-17348]- add gcc9 build fixes (#1676229)- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild- update to 4.11.1 remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch - only include qemutrad build requirements for platforms that use it - construct ovmf.bin from edk2-ovmf package (#1656651)- insufficient TLB flushing / improper large page mappings with AMD IOMMUs [XSA-275, CVE-2018-19961, CVE-2018-19962] (#1651665) - x86: DoS from attempting to use INVPCID with a non-canonical addresses [XSA-279, CVE-2018-19965] (#1651970) - xen: various flaws (#1652251) resource accounting issues in x86 IOREQ server handling [XSA-276, CVE-2018-19963] x86: incorrect error handling for guest p2m page removals [XSA-277, CVE-2018-19964] Fix for XSA-240 conflicts with shadow paging [XSA-280, CVE-2018-19966]- guest use of HLE constructs may lock up host [XSA-282, CVE-2018-19967]- x86: Nested VT-x usable even when disabled [XSA-278, CVE-2018-18883] (#1643118)- set /usr/bin/python2 at the start of another python script- move pkgconfig files to xen-devel (#1629643)- set /usr/bin/python2 at the start of some python scripts- move creation of /usr/lib/xen symlink to posttrans to avoid rpm conflict- move files from /usr/lib/xen to /usr/libexec/xen - create symlink at /usr/lib/xen for compatibility- replace use of deprecated vwprintw- no longer need to set python_sitearch - L1 Terminal Fault speculative side channel patch bundle [XSA-273, CVE-2018-3620, CVE-2018-3646] also includes Use of v2 grant tables may cause crash on ARM [XSA-268, CVE-2018-15469] (#1616081) x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS [XSA-269, CVE-2018-15468] (#1616077) oxenstored does not apply quota-maxentity [XSA-272, CVE-2018-15470] (#1616080)- update to 4.11.0 (#1592976) remove patches for issues now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.fedora.efi.build.patch & xen.gcc8.temp.fix.patch - replace use of deprecated brctl command (#1588712) - add gcc BuildRequires - adjustments now /usr/bin/python is in a separate package - update hypervisor configuration for arm - put back some gcc fixes needed for arm and i686 - work around a build issue with perl - i686 now want to build EFI hypervisor (actually x86_64) so let it- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957)- Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output- Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly)- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)- update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)- fix safe-strings patch for OCaml 4.0.6- avoid building parts of xen twice - hypervisor built with -fcf-protection doesn't work on x86_64- update patch for XPTI mitigation for XSA-254 - add Branch Target Injection (BTI) mitigation for XSA-254 - DoS via non-preemptable L3/L4 pagetable freeing [XSA-252, CVE-2018-7540] (#1549568) - grant table v2 -> v1 transition may crash Xen [XSA-255, CVE-2018-7541] (#1549570) - x86 PVH guest without LAPIC may DoS the host [XSA-256, CVE-2018-7542] (#1549572) - further build issue fixes with gcc8 (some temporary workarounds) - -mcet and -fcf-protection aren't recognized in hypervisor build x86_64 on i686 either- fix some build issues with gcc8- Escape macros in %changelog- Switch to %ldconfig_scriptlets 4.12.2-2.fc314.12.2-2.fc31libxenbus_stubs.axenbus.axenbus.cmxxenbus.cmxalibxenctrl_stubs.axenctrl.axenctrl.cmxxenctrl.cmxalibxeneventchn_stubs.axeneventchn.axeneventchn.cmxxeneventchn.cmxalibxenlight_stubs.axenlight.axenlight.cmxxenlight.cmxalibxenmmap_stubs.axenmmap.axenmmap.cmxxenmmap.cmxaxenstore.axenstore.cmxxenstore.cmxalibxentoollog_stubs.axentoollog.axentoollog.cmxxentoollog.cmxa/usr/lib64/ocaml/xenbus//usr/lib64/ocaml/xenctrl//usr/lib64/ocaml/xeneventchn//usr/lib64/ocaml/xenlight//usr/lib64/ocaml/xenmmap//usr/lib64/ocaml/xenstore//usr/lib64/ocaml/xentoollog/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectiondrpmzstd19x86_64-redhat-linux-gnucurrent ar archivehttps://bugz.fedoraproject.org/xenutf-853b018c054ee7c69377e1e477f54d4b09b9332283b7e1cf6b91490fc01be1bcd?`(/h-84jDLT3xen-ocaml-devel-4.12.1-8.fc31PWP%WOo⨨FÍkvLbe&UY2-2 >  A Љ^XP9 <3Yi~O`͛&XPMTTж-'<3/:ոriJjSd% O ܀ gaڟ D{xc|Y2im䥕0Ǘ7F?˜Pp؁jq8\xp_6v8tj[ǫvKԐ\ M/H}w]Pa6WkwQMYȈzNe8mn'7 yٙ7Lޥ7cm-wNYDkLa~,?$}rL(B`;A'? ?5;@`A;x/LK-iL5AkǁΏϖNY73Ct&?^Ʋ0 nb4yhf"L9&Ngj3y ?[OnNJЖe]M$*HΞ^EHIL-|;&Yͥ Bt+Eb}9ybN4Rl8dedcfc5e6ef84e2f64bfe644153cb6ab8587981e4e014c5217621677a27dce2a913279a36f2907cd0a97d7cffead0fce|a_)awˏʽ8c:V\~mE+J=wsQU=BI3ƚTPf8<{p[dAYWd\m(>z\]ѫ(,Rs"Auz Q]}ëbɘ'IЂEG xd=Ǡ8ۣc·ZK9\U'QEKĿSH|㨅\ʩ)ՈךEğO9ne;6o֤C2m:ۈ1inD,_)hۍG=Ujr5|%޿,Ɣ*"3Hݎkfx槿,)s3Z60 [mYtO;r=—mcHšA+2SN~4ZdZg$m$yCd 4IBM/8.y>dT*͑M =.LA9-u% QCrkH@}DΚt p8lBZh91AY&SY^?+#" (L@$HHDD44@2dɈ !R*i @2Hѐf T4K20ffa]0A0LRYmb)ĔIUjrPX6娨rTdH yIH&Wa!