Sync from SUSE:SLFO:Main xen revision 62bbe8a36d5946ad90b6ab41036b5be3
This commit is contained in:
53
xen.changes
53
xen.changes
@@ -1,3 +1,56 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Jul 3 12:41:39 MDT 2024 - carnold@suse.com
|
||||
|
||||
- bsc#1227355 - VUL-0: CVE-2024-31143: xen: double unlock in x86
|
||||
guest IRQ handling (XSA-458)
|
||||
xsa458.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jun 24 16:20:00 CEST 2024 - jbeulich@suse.com
|
||||
|
||||
- bsc#1214718 - The system hangs intermittently when Power Control
|
||||
Mode is set to Minimum Power on SLES15SP5 Xen
|
||||
6666ba52-x86-irq-remove-offline-CPUs-from-old-CPU-mask-when.patch
|
||||
666994ab-x86-SMP-no-shorthand-IPI-in-hotplug.patch
|
||||
666994f0-x86-IRQ-limit-interrupt-movement-in-fixup_irqs.patch
|
||||
66718849-x86-IRQ-old_cpu_mask-in-fixup_irqs.patch
|
||||
6671885e-x86-IRQ-handle-moving-in-_assign_irq_vector.patch
|
||||
6673ffdc-x86-IRQ-forward-pending-to-new-dest-in-fixup_irqs.patch
|
||||
- Upstream bug fixes (bsc#1027519)
|
||||
66450626-sched-set-all-sched_resource-data-inside-locked.patch
|
||||
66450627-x86-respect-mapcache_domain_init-failing.patch
|
||||
6646031f-x86-ucode-further-identify-already-up-to-date.patch
|
||||
666b07ee-x86-EPT-special-page-in-epte_get_entry_emt.patch
|
||||
666b0819-x86-EPT-avoid-marking-np-ents-for-reconfig.patch
|
||||
666b085a-x86-EPT-drop-questionable-mfn_valid-from-.patch
|
||||
667187cc-x86-Intel-unlock-CPUID-earlier.patch
|
||||
6672c846-x86-xstate-initialisation-of-XSS-cache.patch
|
||||
6672c847-x86-CPUID-XSAVE-dynamic-leaves.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jun 4 18:09:00 MDT 2024 - carnold@suse.com
|
||||
|
||||
- bsc#1225953 - Package xen does not build with gcc14 because of
|
||||
new errors
|
||||
gcc14-fixes.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed May 15 11:15:00 CEST 2024 - jbeulich@suse.com
|
||||
|
||||
- bsc#1221984 - VUL-0: CVE-2023-46842: xen: x86 HVM hypercalls may
|
||||
trigger Xen bug check (XSA-454)
|
||||
6617d62c-x86-hvm-Misra-Rule-19-1-regression.patch
|
||||
- Upstream bug fixes (bsc#1027519)
|
||||
6627a4ee-vRTC-UIP-set-for-longer-than-expected.patch
|
||||
6627a5fc-x86-MTRR-inverted-WC-check.patch
|
||||
662a6a4c-x86-spec-reporting-of-BHB-clearing.patch
|
||||
662a6a8d-x86-spec-adjust-logic-to-elide-LFENCE.patch
|
||||
663090fd-x86-gen-cpuid-syntax.patch
|
||||
663a383c-libxs-open-xenbus-fds-as-O_CLOEXEC.patch
|
||||
663a4f3e-x86-cpu-policy-migration-IceLake-to-CascadeLake.patch
|
||||
663d05b5-x86-ucode-distinguish-up-to-date.patch
|
||||
663eaa27-libxl-XenStore-error-handling-in-device-creation.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 9 14:11:15 MDT 2024 - carnold@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user