- Upstream patches from Jan
5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch 52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch 52820863-VMX-don-t-crash-processing-d-debug-key.patch 5282492f-x86-eliminate-has_arch_mmios.patch 52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch 52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch 5289d225-nested-VMX-don-t-ignore-mapping-errors.patch 528a0eb0-x86-consider-modules-when-cutting-off-memory.patch 528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch 528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch 52932418-x86-xsave-fix-nonlazy-state-handling.patch - Add missing requires to pciutils package for xend-tools - bnc#851749 - Xen service file does not call xend properly xend.service - bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in VT-d (iommu) code 528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch - bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between page_alloc_lock and mm_rwlock CVE-2013-4553-xsa74.patch - bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to guest VMX instruction execution 52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch - bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege rings 1 and 2 of HVM guests OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=279
This commit is contained in:
committed by
Git OBS Bridge
parent
731bb529f3
commit
a11c33863f
73
xen.changes
73
xen.changes
@@ -1,9 +1,79 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 26 08:26:07 MST 2013 - carnold@suse.com
|
||||
|
||||
- Upstream patches from Jan
|
||||
5281fad4-numa-sched-leave-node-affinity-alone-if-not-in-auto-mode.patch
|
||||
52820823-nested-SVM-adjust-guest-handling-of-structure-mappings.patch
|
||||
52820863-VMX-don-t-crash-processing-d-debug-key.patch
|
||||
5282492f-x86-eliminate-has_arch_mmios.patch
|
||||
52864df2-credit-Update-other-parameters-when-setting-tslice_ms.patch
|
||||
52864f30-fix-leaking-of-v-cpu_affinity_saved-on-domain-destruction.patch
|
||||
5289d225-nested-VMX-don-t-ignore-mapping-errors.patch
|
||||
528a0eb0-x86-consider-modules-when-cutting-off-memory.patch
|
||||
528f606c-x86-hvm-reset-TSC-to-0-after-domain-resume-from-S3.patch
|
||||
528f609c-x86-crash-disable-the-watchdog-NMIs-on-the-crashing-cpu.patch
|
||||
52932418-x86-xsave-fix-nonlazy-state-handling.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Nov 22 14:36:12 MST 2013 - carnold@suse.com
|
||||
|
||||
- bnc#851749 - Xen service file does not call xend properly
|
||||
xend.service
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Nov 22 08:15:04 UTC 2013 - adrian@suse.de
|
||||
|
||||
- Add missing requires to pciutils package for xend-tools
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 19 11:52:31 MST 2013 - carnold@suse.com
|
||||
|
||||
- bnc#851386 - VUL-0: xen: XSA-78: Insufficient TLB flushing in
|
||||
VT-d (iommu) code
|
||||
528a0e5b-TLB-flushing-in-dma_pte_clear_one.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Nov 19 10:42:54 CET 2013 - tbehrens@suse.com
|
||||
|
||||
- Make -devel package depend on libuuid-devel, since libxl.h
|
||||
includes uuid.h
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Nov 11 10:22:20 MST 2013 - carnold@suse.com
|
||||
|
||||
- bnc#849667 - VUL-0: xen: XSA-74: Lock order reversal between
|
||||
page_alloc_lock and mm_rwlock
|
||||
CVE-2013-4553-xsa74.patch
|
||||
- bnc#849665 - VUL-0: CVE-2013-4551: xen: XSA-75: Host crash due to
|
||||
guest VMX instruction execution
|
||||
52809208-nested-VMX-VMLANUCH-VMRESUME-emulation-must-check-permission-1st.patch
|
||||
- bnc#849668 - VUL-0: xen: XSA-76: Hypercalls exposed to privilege
|
||||
rings 1 and 2 of HVM guests
|
||||
CVE-2013-4554-xsa76.patch
|
||||
- Upstream patches from Jan
|
||||
52654798-x86-xsave-also-save-restore-XCR0-across-suspend-ACPI-S3.patch
|
||||
526e43d4-x86-refine-address-validity-checks-before-accessing-page-tables.patch
|
||||
526f786a-fix-locking-in-cpu_disable_scheduler.patch
|
||||
5277646c-x86-ACPI-x2APIC-guard-against-out-of-range-ACPI-or-APIC-IDs.patch
|
||||
5277a134-x86-make-sure-memory-block-is-RAM-before-passing-to-the-allocator.patch
|
||||
5278f7f9-x86-HVM-32-bit-IN-result-must-be-zero-extended-to-64-bits.patch
|
||||
527a0a05-call-sched_destroy_domain-before-cpupool_rm_domain.patch
|
||||
527cb7d2-x86-hvm-fix-restart-of-RTC-periodic-timer-with-vpt_align-1.patch
|
||||
527cb820-x86-EFI-make-trampoline-allocation-more-flexible.patch
|
||||
5280aae0-x86-idle-reduce-contention-on-ACPI-register-accesses.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Nov 4 09:42:36 MDT 2013 - carnold@suse.com
|
||||
|
||||
- bnc#848657 - VUL-0: xen: CVE-2013-4494: XSA-73: Lock order
|
||||
reversal between page allocation and grant table locks
|
||||
5277639c-gnttab-correct-locking-order-reversal.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Oct 31 17:07:49 MDT 2013 - carnold@suse.com
|
||||
|
||||
- Update to Xen 4.3.1
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Oct 22 13:42:54 MDT 2013 - carnold@suse.com
|
||||
|
||||
@@ -17,6 +87,9 @@ Mon Oct 21 09:57:54 MDT 2013 - carnold@suse.com
|
||||
- bnc#842515 - VUL-0: CVE-2013-4375: XSA-71: xen: qemu disk backend
|
||||
(qdisk) resource leak
|
||||
CVE-2013-4375-xsa71.patch
|
||||
- bnc#845520 - VUL-0: CVE-2013-4416: xen: ocaml xenstored
|
||||
mishandles oversized message replies
|
||||
CVE-2013-4416-xsa72.patch
|
||||
- Upstream patches from Jan
|
||||
52496bea-x86-properly-handle-hvm_copy_from_guest_-phys-virt-errors.patch (Replaces CVE-2013-4355-xsa63.patch)
|
||||
52496c11-x86-mm-shadow-Fix-initialization-of-PV-shadow-L4-tables.patch (Replaces CVE-2013-4356-xsa64.patch)
|
||||
|
Reference in New Issue
Block a user