| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: xen-libs-debuginfo | Distribution: Fedora Project |
| Version: 4.19.4 | Vendor: Fedora Project |
| Release: 2.fc42 | Build date: Thu Jan 29 21:34:19 2026 |
| Group: Development/Debug | Build host: buildvm-a64-04.rdu3.fedoraproject.org |
| Size: 4548951 | Source RPM: xen-4.19.4-2.fc42.src.rpm |
| Packager: Fedora Project | |
| Url: http://xen.org/ | |
| Summary: Debug information for package xen-libs | |
This package provides debug information for package xen-libs. Debug information is useful when developing applications that use this package or when debugging this package.
GPL-2.0-or-later AND LicenseRef-Callaway-LGPLv2+ AND LicenseRef-Callaway-BSD
* Thu Jan 29 2026 Michael Young <m.a.young@durham.ac.uk> - 4.19.4-2
x86: buffer overrun with shadow paging + tracing [XSA-477, CVE-2025-58150]
(#2434045)
x86: incomplete IBPB for vCPU isolation [XSA-479, CVE-2026-23553]
(#2434047)
* Sat Dec 06 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.4-1
- update to xen-4.19.4
remove patches now included or superceded upstream
* Fri Oct 24 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.3-8
- Incorrect removal of permissions on PCI device unplug [XSA-476,
CVE-2025-58149]
* Tue Oct 21 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.3-6
- x86: Incorrect input sanitisation in Viridian hypercalls [XSA-475,
CVE-2025-58147, CVE-2025-58148]
* Mon Sep 15 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.3-4
- Mutiple vulnerabilities in the Viridian interface [XSA-472,
CVE-2025-27466, CVE-2025-58142, CVE-2025-58143]
- Arm issues with page refcounting [XSA-473, CVE-2025-58144,
CVE-2025-58145]
* Tue Aug 05 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.3-2
- update to xen-4.19.3
remove patches now included or superceded upstream
includes patches for
x86: Incorrect stubs exception handling for flags recovery [XSA-470,
CVE-2025-27465]
x86: Transitive Scheduler Attacks [XSA-471, CVE-2024-36350,
CVE-2024-36357]
* Mon May 12 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.2-4
- x86: Indirect Target Selection [XSA-469, CVE-2024-28956]
* Mon Apr 07 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.2-2
- update to xen-4.19.2
remove patches now included or superceded upstream
remove xen*.efi.elf files to avoid debuginfo failure
* Thu Feb 27 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-7
- deadlock potential with VT-d and legacy PCI device pass-through
[XSA-467, CVE-2025-1713]
* Thu Jan 23 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-6
- adjust file locations now /usr/sbin is a symlink to /usr/bin
- remove debugedit fix as no longer needed
* Sun Jan 19 2025 Fedora Release Engineering <releng@fedoraproject.org> - 4.19.1-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild
* Fri Jan 10 2025 Jerry James <loganjerry@gmail.com> - 4.19.1-4
- OCaml 5.3.0 rebuild for Fedora 42
* Thu Jan 09 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-3
- work around debugedit bug to fix aarch64 builds
* Sat Jan 04 2025 Andrea Perotti <aperotti@redhat.com> - 4.19.1-2
- xen-hypervisor %post doesn't load all needed grub2 modules
(#2335558)
* Thu Dec 05 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-1
- update to xen-4.19.1
remove patches now included or superceded upstream
* Tue Nov 12 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-5
- Deadlock in x86 HVM standard VGA handling [XSA-463, CVE-2024-45818]
- libxl leaks data to PVH guests via ACPI tables [XSA-464, CVE-2024-45819]
- additional patches so above applies cleanly
* Tue Sep 24 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-4
- x86: Deadlock in vlapic_error() [XSA-462, CVE-2024-45817] (#2314782)
* Wed Sep 04 2024 Miroslav Suchý <msuchy@redhat.com> - 4.19.0-3
- convert license to SPDX
* Wed Aug 14 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-2
- error handling in x86 IOMMU identity mapping [XSA-460, CVE-2024-31145]
(#2314784)
- PCI device pass-through with shared resources [XSA-461, CVE-2024-31146]
(#2314783)
* Sat Aug 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-1
- update to xen-4.19.0
rebase xen.fedora.systemd.patch, xen.efi.build.patch
xen.ocaml5.fixes.patch and xen.gcc14.fixes.patch
remove patches now included or superceded upstream
now need to enable systemd explicitly
xentrace_format has gone, pygrub is now only in /usr/libexec/xen/bin/
package xenwatchdogd.8.gz
use relative links for /usr/bin/qemu-system-i386
* Sat Jul 20 2024 Fedora Release Engineering <releng@fedoraproject.org> - 4.18.2-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Tue Jul 16 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-4
- double unlock in x86 guest IRQ handling [XSA-458, CVE-2024-31143]
(#2298690)
* Fri Jun 07 2024 Python Maint <python-maint@redhat.com> - 4.18.2-3
- Rebuilt for Python 3.13
* Mon Jun 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-2
- x86: Native Branch History Injection [XSA-456 version 3, CVE-2024-2201]
* Tue Apr 09 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-1
- x86: Native Branch History Injection [XSA-456, CVE-2024-2201]
- update to xen 4.18.2, remove patches now included upstream
* Tue Apr 09 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.1-2
- x86 HVM hypercalls may trigger Xen bug check [XSA-454, CVE-2023-46842]
- x86: Incorrect logic for BTC/SRSO mitigations [XSA-455, CVE-2024-31142]
* Wed Mar 20 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.1-1
- update to xen-4.18.1
rebase xen.gcc12.fixes.patch
remove patches now included or superceded upstream
* Wed Mar 13 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-7
- x86: Register File Data Sampling [XSA-452, CVE-2023-28746]
- GhostRace: Speculative Race Conditions [XSA-453, CVE-2024-2193]
- additional patches so above applies cleanly
* Tue Feb 27 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-6
- x86: shadow stack vs exceptions from emulation stubs - [XSA-451,
CVE-2023-46841] (#2266326)
* Sun Feb 04 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-5
- pci: phantom functions assigned to incorrect contexts [XSA-449,
CVE-2023-46839]
- VT-d: Failure to quarantine devices in !HVM build [XSA-450,
CVE-2023-46840]
- the glibc32 doesn't seem to add anything to the build so drop it
* Sat Feb 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-4
- build fixes for gcc14, replace stubs-32.h requirement with glibc32
/usr/lib/debug /usr/lib/debug/.build-id /usr/lib/debug/.build-id/06 /usr/lib/debug/.build-id/06/3b5c30e063223f1231cc169cb2a7c79f59a526 /usr/lib/debug/.build-id/06/3b5c30e063223f1231cc169cb2a7c79f59a526.debug /usr/lib/debug/.build-id/08 /usr/lib/debug/.build-id/08/3f71ac6f6540fafaa85a4145fad377113151cc /usr/lib/debug/.build-id/08/3f71ac6f6540fafaa85a4145fad377113151cc.debug /usr/lib/debug/.build-id/09 /usr/lib/debug/.build-id/09/3ec32a078f941ef00615fd8aa2c7091d7490a0 /usr/lib/debug/.build-id/09/3ec32a078f941ef00615fd8aa2c7091d7490a0.debug /usr/lib/debug/.build-id/1f /usr/lib/debug/.build-id/1f/7c5c50c2838aba023858a7fd73288bbb4168f0 /usr/lib/debug/.build-id/1f/7c5c50c2838aba023858a7fd73288bbb4168f0.debug /usr/lib/debug/.build-id/2f /usr/lib/debug/.build-id/2f/0395524a406c689a25a1a24683d8eefb72bc5a /usr/lib/debug/.build-id/2f/0395524a406c689a25a1a24683d8eefb72bc5a.debug /usr/lib/debug/.build-id/42 /usr/lib/debug/.build-id/42/5fa0d6eca6e80bf9f2f61e52824825d209d8a8 /usr/lib/debug/.build-id/42/5fa0d6eca6e80bf9f2f61e52824825d209d8a8.debug /usr/lib/debug/.build-id/42/8004d05fc52e89cf9baf9ae6b3fd9e70f2b80c /usr/lib/debug/.build-id/42/8004d05fc52e89cf9baf9ae6b3fd9e70f2b80c.debug /usr/lib/debug/.build-id/50 /usr/lib/debug/.build-id/50/2f5452a818c7a9cac5b644778c756d6e93cb22 /usr/lib/debug/.build-id/50/2f5452a818c7a9cac5b644778c756d6e93cb22.debug /usr/lib/debug/.build-id/51 /usr/lib/debug/.build-id/51/48e25bfac0b5b2ee15dac5b46ccd3fda8313fd /usr/lib/debug/.build-id/51/48e25bfac0b5b2ee15dac5b46ccd3fda8313fd.debug /usr/lib/debug/.build-id/62 /usr/lib/debug/.build-id/62/bc89237780befa6ab3b47469f55eeda43bb063 /usr/lib/debug/.build-id/62/bc89237780befa6ab3b47469f55eeda43bb063.debug /usr/lib/debug/.build-id/68 /usr/lib/debug/.build-id/68/73bc1413c66577b6ecbfd8d6599a86f1ae8d98 /usr/lib/debug/.build-id/68/73bc1413c66577b6ecbfd8d6599a86f1ae8d98.debug /usr/lib/debug/.build-id/6f /usr/lib/debug/.build-id/6f/da6020398e4894b513f461083d05d87169290c /usr/lib/debug/.build-id/6f/da6020398e4894b513f461083d05d87169290c.debug /usr/lib/debug/.build-id/79 /usr/lib/debug/.build-id/79/dbde1eb9ac1eded4c28fa3317b97b257c86b54 /usr/lib/debug/.build-id/79/dbde1eb9ac1eded4c28fa3317b97b257c86b54.debug /usr/lib/debug/.build-id/86 /usr/lib/debug/.build-id/86/9147ad78dd8a6b24e0646b0d535dc8885ed63b /usr/lib/debug/.build-id/86/9147ad78dd8a6b24e0646b0d535dc8885ed63b.debug /usr/lib/debug/.build-id/8a /usr/lib/debug/.build-id/8a/e50ab715a674762e44794e67ffc1574edf48f6 /usr/lib/debug/.build-id/8a/e50ab715a674762e44794e67ffc1574edf48f6.debug /usr/lib/debug/.build-id/92 /usr/lib/debug/.build-id/92/e8fc88a7cc610a0c10276767c4b9234577e540 /usr/lib/debug/.build-id/92/e8fc88a7cc610a0c10276767c4b9234577e540.debug /usr/lib/debug/.build-id/c3 /usr/lib/debug/.build-id/c3/0c5a69937754bbbe506975c7bae0c53a9c2bd5 /usr/lib/debug/.build-id/c3/0c5a69937754bbbe506975c7bae0c53a9c2bd5.debug /usr/lib/debug/.build-id/d4 /usr/lib/debug/.build-id/d4/85d76ae2dbeab6cd1e35a0a9054883e17e976f /usr/lib/debug/.build-id/d4/85d76ae2dbeab6cd1e35a0a9054883e17e976f.debug /usr/lib/debug/.build-id/d7 /usr/lib/debug/.build-id/d7/5c1b404878a9d977e7478858d3b5f20d7b7ab1 /usr/lib/debug/.build-id/d7/5c1b404878a9d977e7478858d3b5f20d7b7ab1.debug /usr/lib/debug/.build-id/db /usr/lib/debug/.build-id/db/f8de8a44b1ef16c8b16bae89799726d8b682ea /usr/lib/debug/.build-id/db/f8de8a44b1ef16c8b16bae89799726d8b682ea.debug /usr/lib/debug/.build-id/f5 /usr/lib/debug/.build-id/f5/81eebf59376c5b006cd42944e44d073c5aa744 /usr/lib/debug/.build-id/f5/81eebf59376c5b006cd42944e44d073c5aa744.debug /usr/lib/debug/.build-id/f7 /usr/lib/debug/.build-id/f7/dd2c6bfbfa191921a38da8dbe61c2fcc3fb737 /usr/lib/debug/.build-id/f7/dd2c6bfbfa191921a38da8dbe61c2fcc3fb737.debug /usr/lib/debug/usr /usr/lib/debug/usr/lib64 /usr/lib/debug/usr/lib64/libxencall.so.1.3-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenctrl.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxendevicemodel.so.1.4-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenevtchn.so.1.2-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenforeignmemory.so.1.4-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenfsimage.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxengnttab.so.1.2-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenguest.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenhypfs.so.1.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenlight.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenstat.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenstore.so.4.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxentoolcore.so.1.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxentoollog.so.1.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxenvchan.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/libxlutil.so.4.19.0-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage /usr/lib/debug/usr/lib64/xenfsimage/ext2fs-lib /usr/lib/debug/usr/lib64/xenfsimage/ext2fs-lib/fsimage.so-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage/fat /usr/lib/debug/usr/lib64/xenfsimage/fat/fsimage.so-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage/iso9660 /usr/lib/debug/usr/lib64/xenfsimage/iso9660/fsimage.so-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage/reiserfs /usr/lib/debug/usr/lib64/xenfsimage/reiserfs/fsimage.so-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage/ufs /usr/lib/debug/usr/lib64/xenfsimage/ufs/fsimage.so-4.19.4-2.fc42.aarch64.debug /usr/lib/debug/usr/lib64/xenfsimage/zfs /usr/lib/debug/usr/lib64/xenfsimage/zfs/fsimage.so-4.19.4-2.fc42.aarch64.debug
Generated by rpm2html 1.8.1
Fabrice Bellet, Mon Feb 16 23:55:45 2026