| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: xen-libs | Distribution: Fedora Project |
| Version: 4.20.2 | Vendor: Fedora Project |
| Release: 3.fc43 | Build date: Thu Jan 29 12:27:20 2026 |
| Group: Unspecified | Build host: buildvm-a64-25.rdu3.fedoraproject.org |
| Size: 2750440 | Source RPM: xen-4.20.2-3.fc43.src.rpm |
| Packager: Fedora Project | |
| Url: http://xen.org/ | |
| Summary: Libraries for Xen tools | |
This package contains the libraries needed to run applications which manage Xen virtual machines.
GPL-2.0-or-later AND LicenseRef-Callaway-LGPLv2+ AND LicenseRef-Callaway-BSD
* Thu Jan 29 2026 Michael Young <m.a.young@durham.ac.uk> - 4.20.2-3
x86: buffer overrun with shadow paging + tracing [XSA-477, CVE-2025-58150]
(#2434046)
x86: incomplete IBPB for vCPU isolation [XSA-479, CVE-2026-23553]
(#2434048)
* Fri Nov 14 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.2-1.fc43
- update to xen 4.20.2
remove patches now included or superceded upstream
* Fri Oct 24 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.1-8
- Incorrect removal of permissions on PCI device unplug [XSA-476,
CVE-2025-58149]
* Tue Oct 21 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.1-7
- x86: Incorrect input sanitisation in Viridian hypercalls [XSA-475,
CVE-2025-58147, CVE-2025-58148]
* Fri Sep 19 2025 Python Maint <python-maint@redhat.com> - 4.20.1-6
- Rebuilt for Python 3.14.0rc3 bytecode
* Wed Sep 10 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.1-5
- Mutiple vulnerabilities in the Viridian interface [XSA-472,
CVE-2025-27466, CVE-2025-58142, CVE-2025-58143]
- Arm issues with page refcounting [XSA-473, CVE-2025-58144,
CVE-2025-58145]
* Tue Sep 02 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.1-4
- tools/xl: don't crash on NULL command line
* Fri Aug 15 2025 Python Maint <python-maint@redhat.com> - 4.20.1-3
- Rebuilt for Python 3.14.0rc2 bytecode
* Fri Jul 25 2025 Fedora Release Engineering <releng@fedoraproject.org> - 4.20.1-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_43_Mass_Rebuild
* Sun Jul 13 2025 Michael Young <m.a.young@durham.ac.uk> - 4.20.1-1
- update to xen 4.20.1
remove old qemu code for spac file
remove armv7hl and ix86 code from spec file
update configuration in xen.hypervisor.config
minios is now a separate file
package extra ocaml files
unset -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 for hypervisor build
rebase xen.efi.build.patch
includes fixes for security vulnerabilites
x86: Incorrect stubs exception handling for flags recovery [XSA-470,
CVE-2025-27465]
x86: Transitive Scheduler Attacks [XSA-471, CVE-2024-36350,
CVE-2024-36357]
* Fri Jul 11 2025 Jerry James <loganjerry@gmail.com> - 4.19.2-6
- Rebuild to fix OCaml dependencies
* Mon Jun 02 2025 Python Maint <python-maint@redhat.com> - 4.19.2-5
- Rebuilt for Python 3.14
* Mon May 12 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.2-4
- x86: Indirect Target Selection [XSA-469, CVE-2024-28956]
* Mon Apr 07 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.2-2
- update to xen-4.19.2
remove patches now included or superceded upstream
remove xen*.efi.elf files to avoid debuginfo failure
* Thu Feb 27 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-7
- deadlock potential with VT-d and legacy PCI device pass-through
[XSA-467, CVE-2025-1713]
* Thu Jan 23 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-6
- adjust file locations now /usr/sbin is a symlink to /usr/bin
- remove debugedit fix as no longer needed
* Sun Jan 19 2025 Fedora Release Engineering <releng@fedoraproject.org> - 4.19.1-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild
* Fri Jan 10 2025 Jerry James <loganjerry@gmail.com> - 4.19.1-4
- OCaml 5.3.0 rebuild for Fedora 42
* Thu Jan 09 2025 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-3
- work around debugedit bug to fix aarch64 builds
* Sat Jan 04 2025 Andrea Perotti <aperotti@redhat.com> - 4.19.1-2
- xen-hypervisor %post doesn't load all needed grub2 modules
(#2335558)
* Thu Dec 05 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.1-1
- update to xen-4.19.1
remove patches now included or superceded upstream
* Tue Nov 12 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-5
- Deadlock in x86 HVM standard VGA handling [XSA-463, CVE-2024-45818]
- libxl leaks data to PVH guests via ACPI tables [XSA-464, CVE-2024-45819]
- additional patches so above applies cleanly
* Tue Sep 24 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-4
- x86: Deadlock in vlapic_error() [XSA-462, CVE-2024-45817] (#2314782)
* Wed Sep 04 2024 Miroslav Suchý <msuchy@redhat.com> - 4.19.0-3
- convert license to SPDX
* Wed Aug 14 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-2
- error handling in x86 IOMMU identity mapping [XSA-460, CVE-2024-31145]
(#2314784)
- PCI device pass-through with shared resources [XSA-461, CVE-2024-31146]
(#2314783)
* Sat Aug 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.19.0-1
- update to xen-4.19.0
rebase xen.fedora.systemd.patch, xen.efi.build.patch
xen.ocaml5.fixes.patch and xen.gcc14.fixes.patch
remove patches now included or superceded upstream
now need to enable systemd explicitly
xentrace_format has gone, pygrub is now only in /usr/libexec/xen/bin/
package xenwatchdogd.8.gz
use relative links for /usr/bin/qemu-system-i386
* Sat Jul 20 2024 Fedora Release Engineering <releng@fedoraproject.org> - 4.18.2-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild
* Tue Jul 16 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-4
- double unlock in x86 guest IRQ handling [XSA-458, CVE-2024-31143]
(#2298690)
* Fri Jun 07 2024 Python Maint <python-maint@redhat.com> - 4.18.2-3
- Rebuilt for Python 3.13
* Mon Jun 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-2
- x86: Native Branch History Injection [XSA-456 version 3, CVE-2024-2201]
* Tue Apr 09 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.2-1
- x86: Native Branch History Injection [XSA-456, CVE-2024-2201]
- update to xen 4.18.2, remove patches now included upstream
* Tue Apr 09 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.1-2
- x86 HVM hypercalls may trigger Xen bug check [XSA-454, CVE-2023-46842]
- x86: Incorrect logic for BTC/SRSO mitigations [XSA-455, CVE-2024-31142]
* Wed Mar 20 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.1-1
- update to xen-4.18.1
rebase xen.gcc12.fixes.patch
remove patches now included or superceded upstream
* Wed Mar 13 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-7
- x86: Register File Data Sampling [XSA-452, CVE-2023-28746]
- GhostRace: Speculative Race Conditions [XSA-453, CVE-2024-2193]
- additional patches so above applies cleanly
* Tue Feb 27 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-6
- x86: shadow stack vs exceptions from emulation stubs - [XSA-451,
CVE-2023-46841] (#2266326)
* Sun Feb 04 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-5
- pci: phantom functions assigned to incorrect contexts [XSA-449,
CVE-2023-46839]
- VT-d: Failure to quarantine devices in !HVM build [XSA-450,
CVE-2023-46840]
- the glibc32 doesn't seem to add anything to the build so drop it
* Sat Feb 03 2024 Michael Young <m.a.young@durham.ac.uk> - 4.18.0-4
- build fixes for gcc14, replace stubs-32.h requirement with glibc32
/usr/lib/.build-id /usr/lib/.build-id/0a /usr/lib/.build-id/0a/1a15268eeeeab0aa2e679829dd2f2ff20f15df /usr/lib/.build-id/11 /usr/lib/.build-id/11/c1655441ff7992592834b9e40480caf97c417b /usr/lib/.build-id/19 /usr/lib/.build-id/19/76f4615e7c37022e8c6473bbdcaa00c87b1e61 /usr/lib/.build-id/20 /usr/lib/.build-id/20/13764f9f09fd63380639722e583172d72785f3 /usr/lib/.build-id/20/8c00b1fc32dbd69e14b860c107b8c4d83bbbb4 /usr/lib/.build-id/3a /usr/lib/.build-id/3a/31fc0ff76243ef86a44aa717d0f4d2576da07c /usr/lib/.build-id/41 /usr/lib/.build-id/41/b90021a939c61a1d2cd051835ad91bdefb978b /usr/lib/.build-id/6b /usr/lib/.build-id/6b/e185527d53c6418d2760b8e846c5732ec88c4e /usr/lib/.build-id/70 /usr/lib/.build-id/70/8db398b8aa57620001b62c469858eb5d528a29 /usr/lib/.build-id/72 /usr/lib/.build-id/72/d2c6db018209f15083ccf458b30df4abe6cab4 /usr/lib/.build-id/73 /usr/lib/.build-id/73/6b219e3816b4fe0bec01cec3bb66105e0803c7 /usr/lib/.build-id/7b /usr/lib/.build-id/7b/b691513ec1d3dd921d4c80c604227eaed45016 /usr/lib/.build-id/7d /usr/lib/.build-id/7d/379b96da0ddd6a6c3a38450f38d3ba9b551b62 /usr/lib/.build-id/82 /usr/lib/.build-id/82/2dc6affcef65a45a485cccd0e3ad725ea3df4b /usr/lib/.build-id/94 /usr/lib/.build-id/94/738ad6c47cc2a48204b675c83ee244910e4c1a /usr/lib/.build-id/96 /usr/lib/.build-id/96/70bc3b0f00bb682e98deff6b7231767e38eb37 /usr/lib/.build-id/af/5b727494aa826484faf3e801ab73e772847b2f /usr/lib/.build-id/b0 /usr/lib/.build-id/b0/a9c24bbcf6ff4fa50a31b58ba5a054c0f1d32c /usr/lib/.build-id/c0 /usr/lib/.build-id/c0/9ae423a0a66c8829ffa2d55cc70d972fa26076 /usr/lib/.build-id/c7 /usr/lib/.build-id/c7/208333fdbbad11eba3b698f2289bc45b28c085 /usr/lib/.build-id/cb /usr/lib/.build-id/cb/7a40cb2b1de653f3aa848fff03fc5767044d46 /usr/lib/.build-id/e9 /usr/lib/.build-id/e9/acc8442b3c3a6c2ef3bd5050321ac5008d1210 /usr/lib64/libxencall.so.1 /usr/lib64/libxencall.so.1.3 /usr/lib64/libxenctrl.so.4.20 /usr/lib64/libxenctrl.so.4.20.0 /usr/lib64/libxendevicemodel.so.1 /usr/lib64/libxendevicemodel.so.1.4 /usr/lib64/libxenevtchn.so.1 /usr/lib64/libxenevtchn.so.1.2 /usr/lib64/libxenforeignmemory.so.1 /usr/lib64/libxenforeignmemory.so.1.4 /usr/lib64/libxenfsimage.so.4.20 /usr/lib64/libxenfsimage.so.4.20.0 /usr/lib64/libxengnttab.so.1 /usr/lib64/libxengnttab.so.1.2 /usr/lib64/libxenguest.so.4.20 /usr/lib64/libxenguest.so.4.20.0 /usr/lib64/libxenhypfs.so.1 /usr/lib64/libxenhypfs.so.1.0 /usr/lib64/libxenlight.so.4.20 /usr/lib64/libxenlight.so.4.20.0 /usr/lib64/libxenstat.so.4.20 /usr/lib64/libxenstat.so.4.20.0 /usr/lib64/libxenstore.so.4 /usr/lib64/libxenstore.so.4.0 /usr/lib64/libxentoolcore.so.1 /usr/lib64/libxentoolcore.so.1.0 /usr/lib64/libxentoollog.so.1 /usr/lib64/libxentoollog.so.1.0 /usr/lib64/libxenvchan.so.4.20 /usr/lib64/libxenvchan.so.4.20.0 /usr/lib64/libxlutil.so.4.20 /usr/lib64/libxlutil.so.4.20.0 /usr/lib64/xenfsimage /usr/lib64/xenfsimage/ext2fs-lib /usr/lib64/xenfsimage/ext2fs-lib/fsimage.so /usr/lib64/xenfsimage/fat /usr/lib64/xenfsimage/fat/fsimage.so /usr/lib64/xenfsimage/iso9660 /usr/lib64/xenfsimage/iso9660/fsimage.so /usr/lib64/xenfsimage/reiserfs /usr/lib64/xenfsimage/reiserfs/fsimage.so /usr/lib64/xenfsimage/ufs /usr/lib64/xenfsimage/ufs/fsimage.so /usr/lib64/xenfsimage/zfs /usr/lib64/xenfsimage/zfs/fsimage.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Jan 31 23:11:01 2026