Sat, 16 Nov 2024 07:12:27 CET | login

Information for build xen-4.13.5-9.44.1.xcpng8.2

ID3507
Package Namexen
Version4.13.5
Release9.44.1.xcpng8.2
Epoch
Sourcegit+https://github.com/xcp-ng-rpms/xen.git#a4b5a19f447c3257c8f2473a5a9eb3e2db5d1b51
SummaryXen is a virtual machine monitor
DescriptionXen Hypervisor.
Built bydavid.morel
State complete
Volume DEFAULT
StartedWed, 25 Sep 2024 12:07:40 CEST
CompletedWed, 25 Sep 2024 12:12:58 CEST
Taskbuild (v8.2-incoming, /xcp-ng-rpms/xen.git:a4b5a19f447c3257c8f2473a5a9eb3e2db5d1b51)
Extra{'source': {'original_url': 'git+https://github.com/xcp-ng-rpms/xen.git?#a4b5a19f447c3257c8f2473a5a9eb3e2db5d1b51'}}
Tags
built-by-xcp-ng
v8.2-updates
RPMs
src
xen-4.13.5-9.44.1.xcpng8.2.src.rpm (info) (download)
x86_64
xen-devel-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-dom0-libs-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-dom0-libs-devel-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-dom0-tests-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-dom0-tools-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-hypervisor-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-installer-files-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-libs-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-libs-devel-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-lp-devel_4.13.5_9.44-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-ocaml-devel-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-ocaml-libs-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-tools-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-debuginfo-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
xen-hypervisor-debuginfo-4.13.5-9.44.1.xcpng8.2.x86_64.rpm (info) (download)
Logs
x86_64
hw_info.log
state.log
build.log
root.log
installed_pkgs.log
mock_output.log
Changelog * Wed Sep 25 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.44.1 - Synced from hotfix XS82ECU1077 - Replace our backports for XSA-458 and XSA-460 - *** Upstream changelog *** - * Thu Sep 19 2024 Alex Brett <alex.brett@cloud.com> - 4.13.5-9.44 - - Fix a packaging issue affecting livepatching - * Thu Sep 12 2024 Roger Pau Monné <roger.pau@citrix.com> - 4.13.5-9.43 - - Fix for XSA-462 / CVE-2024-45817. - * Thu Sep 05 2024 Alejandro Vallejo <alejandro.vallejo@cloud.com> - 4.13.5-9.42 - - Fix for XSA-460 / CVE-2024-31145. - * Thu Jul 11 2024 Roger Pau Monné <roger.pau@citrix.com> - 4.13.5-9.41 - - Fixes for XSA-458 CVE-2024-31143. - - Fix early detection of CPU features on hardware with the CPUID Limit active - in firmware. - - Fix RTC emulation. * Tue Aug 13 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.40.3 - Security update - Fix for: - XSA-460 CVE-2024-31145 - error handling in x86 IOMMU identity mapping - XSA-461 CVE-2024-31146 - PCI device pass-through with shared resources * Mon Jul 15 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.40.2 - Security update - Fix for: - XSA-458 CVE-2024-31143: fixing double unlock in x86 guest IRQ handling * Thu Apr 11 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.40.1 - Security update, synced from hotfix XS82ECU1062 - *** Upstream changelog *** - * Mon Apr 8 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.40 - - Fixes for: - - XSA-454 CVE-2023-46842 - - XSA-455 CVE-2024-31142 - - XSA-456 CVE-2024-2201 * Wed Mar 13 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.39.1 - Security update, synced from hotfix XS82ECU1061 - Replace our fix for XSA-449 - *** Upstream changelog *** - * Fri Mar 8 2024 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.39 - - Fixes for: - - XSA-449 CVE-2023-46839 - - XSA-453 CVE-2024-2193, off by default - - XSA-452 CVE-2023-28746 * Wed Jan 31 2024 David Morel <david.morel@vates.tech> - 4.13.5-9.38.3 - Security update. - Fix for: - XSA-449 CVE-2023-46839 * Thu Nov 16 2023 Gael Duperrey <gduperrey@vates.tech> - 4.13.5-9.38.1 - Security update, synced from hotfix XS82ECU1057 - *** Upstream changelog *** - * Mon Nov 6 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.38 - - Fixes for - - XSA-445 CVE-2023-46835 - - XSA-446 CVE-2023-46836 - - Fix for AMD erratum #1485, which has been observed to cause #UD exception on AMD Zen4 systems. * Thu Oct 12 2023 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.5-9.37.1 - Security update - Sync with hotfix XS82ECU1047, which fixes XSAs we already fixed, but also goes further on XSA-443 and adds other fixes - *** Upstream changelog *** - * Wed Oct 4 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.37 - - Fixes for - - XSA-438 CVE-2023-34322 - - XSA-439 CVE-2023-20588 - - XSA-440 CVE-2023-34323 - - XSA-442 CVE-2023-34326 - - XSA-443 CVE-2023-34325 - - XSA-444 CVE-2023-34327 CVE-2023-34328 - - Pygrub extended to deprivilege itself before operating on guest disks. - - Ignore MADT entries with invalid APIC_IDs. - - Fix the emulation of VPBLENDMW with a mask and memory operand. - - Fix a incorrect diagnostic about spurious interrupts. - - Update IO-APIC IRTEs atomically. Fixes a race condition which causes - interrupts to be routed badly, often with "No irq handler for vector" - errors. - - Further fix for XSA-433. Extend the chicken-bit workaround to all CPUs - which appear to be a Zen2 microarchtiecture, even those not on the published - model list. - - Fix for AMD errata #1474. Disable C6 after 1000 days of uptime on AMD Zen2 - systems to avoid a crash at ~1044 days. - - Fix for MSR_ARCH_CAPS boot-time calculations for PV guests. * Tue Oct 03 2023 Andrei Semenov <andrei.semenov@vates.tech> - 4.13.5-9.36.3 - Security update - Fixes for XSA-440, XSA-442, XSA-443 and XSA-444 * Tue Sep 26 2023 Andrei Semenov <andrei.semenov@vates.tech> - 4.13.5-9.36.2 - More fixes to Zenbleed (XenServer backport from Xen Project) - Fix for AMD errata #1474 (XenServer backport from Xen Project) - Fix for XSA-429 (XenServer backport from Xen Project) * Tue Aug 08 2023 Gael Duperrey <gduperrey@vates.fr> - 4.13.5-9.36.1 - Security update, synced from hotfix XS82ECU1045 - *** Upstream changelog *** - * Thu Aug 3 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.36 - - Fixes for - - XSA-434 CVE-2023-20569 - - XSA-435 CVE-2022-40982 - - Expose MSR_ARCH_CAPS to guests on all Intel hardware by default. On Cascade - Lake and later hardware, guests now see the bits stating hardware immunity - to various speculative vulnerabilities. * Thu Aug 03 2023 Gael Duperrey <gduperrey@vates.fr> - 4.13.5-9.35.1 - Synced from hotfix XS82ECU1044 - *** Upstream changelog *** - * Tue Aug 1 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.35 - - Fix bug in XSA-433 fix, which accidentally disabled a hardware errata workaround. * Mon Jul 24 2023 Gael Duperrey <gduperrey@vates.fr> - 4.13.5-9.34.1 - Security update, synced from hotfix XS82ECU1041 - *** Upstream changelog *** - * Sat Jul 22 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.34 - - Fix for XSA-433 CVE-2023-20593. - * Tue Jul 4 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.33 - - Hide MPX by default from guests. This simplifies cross-pool upgrade scenarios. - - Limit scheduler loadbalancing to once per millisecond. This improves performance on large systems. * Thu May 25 2023 Gael Duperrey <gduperrey@vates.fr> - 4.13.5-9.32.1 - Synced from hotfix XS82ECU1034 - *** Upstream changelog *** - * Tue May 16 2023 Roger Pau Monné <roger.pau@citrix.com> - 4.13.5-9.32 - - Mitigate performance degradation with logdirty by disabling VCPU_SSHOTTMR_future. - - Adjust bogus assert in AMD-Vi code. - - Early boot improvements. * Thu May 11 2023 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.5-9.31.1 - Synced from hotfix XS82ECU1030 - Dropped our XSA-427 to 429 patches, now applied upstream - *** Upstream changelog *** - * Mon Apr 17 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.31 - - Remove the NR_IOMMUs compile time limit. This is necessary to boot on - 4-socket Sapphire Rapids systems. - - Cope booting in x2APIC mode on AMD systems without XT mode. - - Load AMD microcode on all logical processors. - - Fixes for - - XSA-427 CVE-2022-42332 - - XSA-428 CVE-2022-42333 CVE-2022-42334 - - XSA-429 CVE-2022-42331 - - Increase the size of the serial transmit buffer. * Thu Mar 16 2023 Andrei Semenov <andrei.semenov@vates.fr> - 4.13.5-9.30.3 - Fix for XSA-427 (applied as is from Xen Project). - Fix for XSA-428 (applied as is from Xen Project). part 1 - Fix for XSA-428 (applied as is from Xen Project). part 2 - Fix for XSA-429 (adapted from Xen Project) * Mon Mar 13 2023 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.5-9.30.2 - Restore xen-dom0-devel Provides for xen-dom0-libs-devel * Thu Feb 23 2023 Gael Duperrey <gduperrey@vates.fr> 4.13.5-9.30.1 * Synced from hotfix XS82ECU1026 - *** Upstream changelog *** - * Mon Feb 6 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.30 - - Fix for XSA-426 CVE-2022-27672. - - Fix memory corruption issues in the Ocaml bindings. - - On xenstored live update, validate the config file before launching into the new xenstored. - * Mon Feb 6 2023 Andrew Cooper <andrew.cooper3@citrix.com> - 4.13.5-9.29 - - Update to Xen 4.13.5 - The upstream commit history before this point also mentions "Initial Sapphire Rapids support" and other changes * Thu Feb 16 2023 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.29.2 - Fix XSA-426 - Reboot required * Mon Jan 02 2023 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.29.1 - Synced from hotfix XS82ECU1023 - Enable AVX-512 by default for EPYC Zen4 (Genoa) - Reboot required * Wed Nov 09 2022 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.28.1 - Synced from hotfix XS82ECU1021 - Fix XSA-422 and other issues - See http://xenbits.xen.org/xsa/ - Reboot required * Wed Nov 02 2022 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.27.1 - Security update, synced from hotfix XS82ECU1020 - Fix XSA-326 XSA-414 XSA-415 XSA-416 XSA-417 XSA-418 XSA-419 XSA-420 XSA-421 - Reboot required * Tue Oct 11 2022 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.26.1 - Security update, synced from hotfix XS82ECU1016 - Fix XSA-410, XSA-411, and other issues - Reboot required * Wed Aug 10 2022 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.25.1 - Synced from hotfix XS82ECU1015 - Remove amd-iommu-correct-xt-handling.patch, it's already in XS82ECU1015 - Reboot required * Fri Jul 29 2022 Andrei Semenov <andrei.semenov@vates.fr> - 4.13.4-9.24.2 - Add amd-iommu-correct-xt-handling.patch * Tue Jul 12 2022 Gael Duperrey <gduperrey@vates.fr> - 4.13.4-9.24.1 - Security update, synced from hotfix XS82ECU1014 - XSA 407 - See http://xenbits.xen.org/xsa/ - Reboot required * Thu Jun 23 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.23.1 - Security update, synced from hotfix XS82ECU1012 - Fix XSA 404 - Replaced our XSA 401 and 402 patches with those from the XS hotfix - See http://xenbits.xen.org/xsa/ - Reboot required * Fri Jun 10 2022 Andrei Semenov <andrei.semenov@vates.fr> - 4.13.4-9.22.2 - Security update - Related to XSA 401 and XSA 402 - See http://xenbits.xen.org/xsa/ - Reboot required * Wed May 11 2022 Gaël Duperrey <gduperrey@vates.fr> - 4.13.4-9.22.1 - Sync with hotfix XS82ECU1010 - Integrated upstream patches related to XSA 400 to replace our patches - See http://xenbits.xen.org/xsa/ - Reboot required * Tue Apr 05 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.21.2 - Security update, synced from hotfix XS82ECU1007 - Related to XSAs 397, 399 and 400 - See http://xenbits.xen.org/xsa/ - Additional patches added from upstream xen to fix fallouts of XSA-400 patches - Reboot required * Wed Mar 09 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.20.1 - Security update, synced from hotfix XS82ECU1006 - Related to XSA 398 - See http://xenbits.xen.org/xsa/ - Reboot required * Wed Feb 09 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.19.1 - Security update, synced from hotfix XS82E037 - Adapt to new microcode released to fix security vulnerabilities in Intel CPUs - Also fixes XSAs 394 and 395 - Reboot required * Thu Jan 13 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.18.1 - Security update, synced from hotfix XS82E035 - Related to XSAs 388, 389 - See http://xenbits.xen.org/xsa/ - Reboot required * Mon Jan 10 2022 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.4-9.17.1 - Sync with CH 8.2.1 - Keep using python-devel as build dependency until python is updated * Thu Sep 09 2021 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.12.1 - Security update, synced from hotfix XS82E032 - Related to XSAs 378, 379, 380, 382, 384 - See http://xenbits.xen.org/xsa/ - Reboot required * Thu Jun 10 2021 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.11.1 - Security update, synced from hotfix XS82E026 - Related to XSAs 373, 375, 377 - See http://xenbits.xen.org/xsa/ - Reboot required * Thu Feb 04 2021 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.9.1 - Sync with hotfix XS82E016 - Bugfix update (we already had applied the security patch for XSA-360) - Reboot required * Mon Jan 25 2021 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.8.4 - Remove dist tag from XEN_VENDORVERSION - Avoids hitting the 16 char limit in xen_extra - Related to https://github.com/xcp-ng/xcp/issues/476 * Thu Jan 21 2021 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.8.3 - Security update - Related to XSA 360 - See http://xenbits.xen.org/xsa/advisory-360.html - Reboot required * Wed Dec 16 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.8.2 - Security update - Related to XSAs 115, 322, 323, 324, 325, 330, 348, 352, 353, 358, 359 - See http://xenbits.xen.org/xsa/ - Reboot required * Tue Nov 24 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.7.1 - Security update - Related to XSA-355 - See http://xenbits.xen.org/xsa/advisory-355.html - Reboot required * Thu Nov 12 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.6.1 - Security update - Related to XSA-351 - See http://xenbits.xen.org/xsa/advisory-351.html - Patch for XSA-286 rewritten for better performance. - Reboot required * Tue Oct 27 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.5.1 - Security update - Related to XSAs 286, 345, 346, 347 - See http://xenbits.xen.org/xsa/ - Reboot required * Wed Sep 23 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.3.1 - Security update - Related to XSAs 333, 334, 336, 337, 338, 339, 340, 342, 343, 344 - See http://xenbits.xen.org/xsa/ - Reboot required - Also remove xen-4.13.1-insert-Ice-Lake-and-Comet-Lake-model-numbers.backport.patch, not needed anymore * Sun Sep 06 2020 Rushikesh Jadhav <rushikesh7@gmail.com> - 4.13.1-9.2.2 - Insert Ice Lake and Comet Lake model numbers * Thu Jul 09 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.2.1 - Security update - Related to XSA-317, XSA-319, XSA-321, XSA-328 - See http://xenbits.xen.org/xsa/ - Reboot required * Wed Jul 01 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.1-9.1.1 - Rebase on CH 8.2 * Fri Jun 12 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.0-8.5.1 - Update for new microcode related to SRBDS Intel issues - Related to XSA-320 - See http://xenbits.xen.org/xsa/ - Reboot required * Tue Apr 14 2020 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.0-8.4 - Security update - Related to XSA-307, XSA-313, XSA-316, XSA-318 - See http://xenbits.xen.org/xsa/ - Reboot required * Thu Dec 19 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.13.0-8.3 - Rebase on CH 8.1 - Drop our changes to xenguest for max_grant_frames * Thu Dec 12 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.8 - Security update - Related to XSA-308, XSA-309, XSA-310, XSA-311 - See http://xenbits.xen.org/xsa/ - Reboot required * Wed Nov 13 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.7 - Security update - Related to XSA-304 and XSA-305 - See http://xenbits.xen.org/xsa/ - Reboot required * Mon Nov 04 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.6 - Security update - Fix XSA-296, XSA-298, XSA-299, XSA-302 - See http://xenbits.xen.org/xsa/ - Reboot required * Fri Oct 18 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.5.2 - Make max_grant_frames and max_maptrack_frames configurable - Default value of max_grant_frames is not sufficient in some cases - VM params platform/max_grant_frames and max_maptrack_frames are now used - Refs https://github.com/xcp-ng/xcp/issues/289 * Fri Aug 30 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.5.1 - Fix a possible memory corruption when forcibly shutting down a VM with AMD MxGPU attached - Fix a possible host crash when forcibly shutting a Windows VMs that is in an unclean state - After a live migration, a Windows VM could hang for more than a minute - Windows VMs with the viridian_reference_tsc flag enabled could crash during migration - Patches imported from XS 8.0 hotfix XS80E004 * Thu May 16 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.3 - Security update - Fix XSA-297 - See http://xenbits.xen.org/xsa/advisory-297.html - Reboot required * Mon Apr 29 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.11.1-7.2 - Update for XCP-ng 8.0 * Thu Mar 07 2019 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.6-6.4.1 - Security update - Fix XSA-283, XSA-284, XSA-285, XSA-287, XSA-288, XSA-290, XSA-292, XSA-293 and XSA-294 - See http://xenbits.xen.org/xsa/ - Reboot required * Tue Nov 20 2018 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.6-6.3.1.xcp - Security update - Fix XSA-275, XSA-279, XSA-280 and XSA-282 * Fri Oct 26 2018 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.6-6.2.1.xcp - Security update - Fix CVE-2018-TBA: Nested VT-x usable even when disabled * Thu Sep 13 2018 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.6-6.1.1.xcp - Update for XCP-ng 7.6 * Wed Aug 15 2018 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.5-5.5.1xcp - Multiple security updates * Thu Aug 02 2018 Samuel Verschelde <stormi-xcp@ylix.fr> - 4.7.5-5.4.1xcp - Security update - Fix CVE-2018-12893: x86: #DB exception safety check can be triggered by a guest - Fix CVE-2018-12891: preemption checks bypassed in x86 PV MM handling