development/libraries

xen-ocaml - Ocaml libraries for Xen tools

Website: http://xen.org/
License: GPLv2+ and LGPLv2+ and BSD
Vendor: Fedora Project
Description:
This package contains libraries for ocaml tools to manage Xen
virtual machines.

Packages

xen-ocaml-4.6.6-1.fc24.x86_64 [510 KiB] Changelog by Michael Young (2017-07-07):
- update to xen-4.6.6
  adjust xen.use.fedora.ipxe.patch
  remove upstream patches
xen-ocaml-4.6.5-7.fc24.x86_64 [509 KiB] Changelog by Michael Young (2017-06-22):
- xen: various flaws (#1463247)
  blkif responses leak backend stack data [XSA-216]
  page transfer may allow PV guest to elevate privilege [XSA-217]
  Races in the grant table unmap code [XSA-218]
  x86: insufficient reference counts during shadow emulation [XSA-219]
  x86: PKRU and BND* leakage between vCPU-s [XSA-220]
  stale P2M mappings due to insufficient error checking [XSA-222]
  ARM guest disabling interrupt may crash Xen [XSA-223]
  grant table operations mishandle reference counts [XSA-224]
  arm: vgic: Out-of-bound access when sending SGIs [XSA-225]
- NULL pointer deref in event channel poll [XSA-221] (#1463231)
xen-ocaml-4.6.5-6.fc24.x86_64 [509 KiB] Changelog by Michael Young (2017-05-04):
- xen: various flaws (#1447345)
  x86: 64bit PV guest breakout via pagetable use-after-mode-change [XSA-213]
  grant transfer allows PV guest to elevate privileges [XSA-214]
  possible memory corruption via failsafe callback [XSA-215]
xen-ocaml-4.6.5-5.fc24.x86_64 [509 KiB] Changelog by Michael Young (2017-04-05):
- Qemu: 9pfs: host memory leakage via v9fs_create [CVE-2017-7377] (#1437873)
- x86: broken check in memory_exchange() permits PV guest breakout
	[XSA-212, CVE-2017-7228] (#1438804)
xen-ocaml-4.6.5-1.fc24.x86_64 [499 KiB] Changelog by Michael Young (2017-03-08):
- update to xen-4.6.5
  adjust xen.use.fedora.ipxe.patch, # qemu.trad.bug1399055.patch and
	qemu.git-4299b90e9ba9ce5ca9024572804ba751aa1a7e70.patch
  remove upstream patches
xen-ocaml-4.6.4-8.fc24.x86_64 [499 KiB] Changelog by Michael Young (2017-02-25):
- cirrus_bitblt_cputovideo does not check if memory region is safe
	[XSA-209, CVE-2017-2620] (#1425420)
xen-ocaml-4.6.4-7.fc24.x86_64 [499 KiB] Changelog by Michael Young (2017-02-16):
- memory leak when destroying guest without PT devices [XSA-207] (#1422492)
- update patches for XSA-208 after upstream revision (no functional change)
xen-ocaml-4.6.4-5.fc24.x86_64 [498 KiB] Changelog by Michael Young (2016-12-22):
- two security flaws (#1406840)
  x86 PV guests may be able to mask interrupts [XSA-202, CVE-2016-10024]
  x86: missing NULL pointer check in VMFUNC emulation [XSA-203, CVE-2016-10025]
- x86: Mishandling of SYSCALL singlestep during emulation [XSA-204,
	CVE-2016-10013] (#1406260)
xen-ocaml-4.6.3-5.fc24.x86_64 [497 KiB] Changelog by Michael Young (2016-09-08):
- x86: Disallow L3 recursive pagetable for 32-bit PV guests [XSA-185,
	CVE-2016-7092] (#1374470)
- x86: Mishandling of instruction pointer truncation during emulation
	[XSA-186, CVE-2016-7093] (#1374471)
- x86 HVM: Overflow of sh_ctxt->seg_reg[] [XSA-187, CVE-2016-7094] (#1374473)
xen-ocaml-4.6.3-4.fc24.x86_64 [497 KiB] Changelog by Michael Young (2016-07-27):
- x86: Privilege escalation in PV guests [XSA-182, CVE-2016-6258] (#1360358)
- x86: Missing SMAP whitelisting in 32-bit exception / event delivery
	[XSA-183, CVE-2016-6259] (#1360359)
- virtio: unbounded memory allocation issue [XSA-184, CVE-2016-5403] (#1360831)
- Qemu: scsi: esp: OOB write access in esp_do_dma [CVE-2016-6351] (#1360599)
xen-ocaml-4.6.3-2.fc24.x86_64 [497 KiB] Changelog by Michael Young (2016-07-10):
- perl build requires change for F25
- allow bigger xs_watch pthread stacksize for Fedora qemu
xen-ocaml-4.6.3-1.fc24.x86_64 [496 KiB] Changelog by Michael Young (2016-06-23):
- update to xen-4.6.3
  adjust xen.use.fedora.ipxe.patch, xen.fedora.crypt.patch
    and xen.gcc6.fix.patch
  remove upstream patches

Listing created by Repoview-0.6.6-6.fc21