|
|
|
|
Changelog for ocaml-xen-4.16.1-1.2.mga8.x86_64.rpm :
* Mon Apr 25 2022 ghibo 4.16.1-1.2.mga8+ Revision: 1853449- Merge patches to fix python scripts to python3 (otherwise /usr/bin/xencons et al. fails).- Remove Source16 and Source17 and cmake from BuildRequires to keep the previous mga original SPEC configuration.- Add Source17 (gmp) so it doesn\'t try to download during building- Add Source16 (tpm_emulator) so it doesn\'t try to download during building- Update to release 4.16.1 (more security fixes).- Add cmake to BuildRequires (for vtpm/vtpmmgr).- Update xen.hypervisor.config and xen.hypervisor.config.debug for newer kernel entries.+ tv - 4.16.0- sync with Cauldron\'s package- Move /lib/xenfsimage into library package- don\'t build qemu-traditional or pv-grub by default (following upstream)- fix some incorrect dependencies on building qemu-traditional- rework seabios configure logic (bios.bin is no longer useful)- unpackage /boot/EFI/EFI/mageia/xen *.efi- frontends vulnerable to backends [XSA-376] (document change only)- change grub module package dependencies from Suggests to Recommends and move to hypervisor package- Linux: display frontend \"be-alloc\" mode is unsupported (comment only) [XSA-363, CVE-2021-26934] (#1929549)- arm: The cache may not be cleaned for newly allocated scrubbed pages [XSA-364, CVE-2021-26933] (#1929547)- backport upstream zstd dom0 and guest patches- BR libzstd- add weak dependency on grub modules to improve initial boot setup- IRQ vector leak on x86 [XSA-360] * Mon Dec 21 2020 tv 4.14.1-1.mga8+ Revision: 1662465- update to 4.14.1 * Wed Dec 16 2020 tv 4.14.0-11.mga8+ Revision: 1658002- xenstore watch notifications lacking permission checks [XSA-115, CVE-2020-29480] (rhbz#1908091)- Xenstore: new domains inheriting existing node permissions [XSA-322, CVE-2020-29481] (rhbz#1908095)- Xenstore: wrong path length check [XSA-323, CVE-2020-29482] (rhbz#1908096)- Xenstore: guests can crash xenstored via watchs [XSA-324, CVE-2020-29484] (rhbz#1908088)- Xenstore: guests can disturb domain cleanup [XSA-325, CVE-2020-29483] (rhbz#1905648)- oxenstored memory leak in reset_watches [XSA-330, CVE-2020-29485] (rhbz#1908000)- undue recursion in x86 HVM context switch code [XSA-348, CVE-2020-29566] (rhbz#1908085)- oxenstored: node ownership can be changed by unprivileged clients [XSA-352, CVE-2020-29486] (rhbz#1908002)- oxenstored: permissions not checked on root node [XSA-353, CVE-2020-29479] (rhbz#1908003)- infinite loop when cleaning up IRQ vectors [XSA-356, CVE-2020-29567] (rhbz#1907932)- FIFO event channels control block related ordering [XSA-358, CVE-2020-29570] (rhbz#1907931)- FIFO event channels control structure ordering [XSA-359, CVE-2020-29571] (rhbz#1908089)- Work around another gcc-11 stringop-overflow diagnostic * Wed Nov 25 2020 tv 4.14.0-10.mga8+ Revision: 1649191- stack corruption from XSA-346 change [XSA-355] * Mon Nov 23 2020 tv 4.14.0-9.mga8+ Revision: 1648810- Support zstd compressed kernels (dom0 only) based on linux kernel code * Wed Nov 11 2020 tv 4.14.0-8.mga8+ Revision: 1644447- Information leak via power sidechannel [XSA-351, CVE-2020-28368] (#1897146) * Wed Nov 04 2020 tv 4.14.0-7.mga8+ Revision: 1642581- revised patch for XSA-286 (mitigating performance impact)- Work around gcc-11 stringop-overflow diagnostics as well * Thu Oct 29 2020 tv 4.14.0-6.1.mga8+ Revision: 1640521- updage grub2 config when (un)installing hypervisor- x86 PV guest INVLPG-like flushes may leave stale TLB entries [XSA-286, CVE-2020-27674] (#1891092)- some fixes for gcc 11- switch to systemd macros, use them in the sub pkgs- drop the requires on grub (useless)- drop the requires on kmod (already in basesystem)- drop obsolete BR on texi2html ghostscript tetex-latex- requires kpartx- fix license * Wed Oct 21 2020 tv 4.14.0-5.mga8+ Revision: 1637766- create a xen-licenses collecting all sub licenses- split runtime in order to minimize deps- add xen-hypervisor-abi provides- do not hard requires the full qemu stack (deps!) * Tue Oct 20 2020 tv 4.14.0-4.mga8+ Revision: 1637400- x86: Race condition in Xen mapping code [XSA-345]- undue deferral of IOMMU TLB flushes [XSA-346]- unsafe AMD IOMMU page table updates [XSA-347]- do not require non existing kernel-server on arm * Wed Sep 23 2020 tv 4.14.0-3.mga8+ Revision: 1629525- x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (rhbz#1881619)- Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (rhbz#1881616)- race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (rhbz#1881618)- PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (rhbz#1881587)- once valid event channels may not turn invalid [XSA-338, CVE-2020-25597] (rhbz#1881588)- x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596] (rhbz#1881617)- Missing memory barriers when accessing/allocating an event channel [XSA-340, CVE-2020-25603] (rhbz#1881583)- out of bounds event channels available to 32-bit x86 domains [XSA-342, CVE-2020-25600] (rhbz#1881582)- races with evtchn_reset() [XSA-343, CVE-2020-25599] (rhbz#1881581)- lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344, CVE-2020-25601] (rhbz#1881586) * Tue Aug 25 2020 tv 4.14.0-2.mga8+ Revision: 1618903- QEMU: usb: out-of-bounds r/w access issue [XSA-335, CVE-2020-14364] (rhbz#1871850) * Sat Aug 01 2020 tv 4.14.0-1.mga8+ Revision: 1610277- update to 4.14.0 remove or adjust patches now included or superceded upstream adjust xen.hypervisor.config bison and flex packages now needed for hypervisor build /usr/bin/vchan-socket-proxy and /usr/sbin/xenhypfs have been added with associated libraries and man page- revise documentation build dependencies drop tex, texinfo, ghostscript, graphviz, discount add perl(Pod::Html) perl(File::Find)- additional build dependency for ocaml on perl(Data::Dumper) * Wed Jul 08 2020 tv 4.13.1-3.mga8+ Revision: 1603032- incorrect error handling in event channel port allocation leads to DoS [XSA-317, CVE-2020-15566] (#1854465)- inverted code paths in x86 dirty VRAM tracking leads to DoS [XSA-319, CVE-2020-15563] (#1854463)- xen: insufficient cache write-back under VT-d leads to DoS [XSA-321, CVE-2020-15565] (#1854467)- missing alignment check in VCPUOP_register_vcpu_info leads to DoS [XSA-327, CVE-2020-15564] (#1854458)- non-atomic modification of live EPT PTE leads to DoS [XSA-328, CVE-2020-15567] (#1854464) * Thu Jun 11 2020 tv 4.13.1-2.mga8+ Revision: 1592274- Special Register Buffer speculative side channel [XSA-320] * Tue May 19 2020 tv 4.13.1-1.mga8+ Revision: 1586256- update to 4.13.1 * Wed May 06 2020 tv 4.13.0-21.mga8+ Revision: 1581249- force gcc >= 10- build aarch64 hypervisor with -mno-outline-atomics to fix gcc 10 build
|
|
|