block-dmmd
- Update to Xen 4.3.0-rc2
- Consolidate all xend and traditional qemu patches into one patch
file. Rename '.diff' patches to '.patch' and reoder others.
xend-traditional-qemu.patch
- Create a xend-tools package for the legacy xend toolstack files
- Update to Xen 4.3.0-rc1 c/s 27068
- bnc#818183 - VUL-0: xen: CVE-2013-2007: XSA-51: qga set umask
0077 when daemonizing
CVE-2013-2007-xsa51-1.patch
CVE-2013-2007-xsa51-2.patch
- bnc#808269 - Fully Virtualized Windows VM install is failed on
Ivy Bridge platforms with Xen kernel
26754-hvm-Improve-APIC-INIT-SIPI-emulation.patch
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=241
- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch
It changed migration protocol and upstream wants a different solution
- bnc#802221 - fix xenpaging
readd xenpaging.qemu.flush-cache.patch
- Upstream patches from Jan
26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch
26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch
- Additional fix for bnc#816159
CVE-2013-1918-xsa45-followup.patch
- bnc#817068 - Xen guest with >1 sr-iov vf won't start
xen-managed-pci-device.patch
- Update to Xen 4.2.2 c/s 26064
The following recent security patches are included in the tarball
CVE-2013-0151-xsa34.patch (bnc#797285)
CVE-2012-6075-xsa41.patch (bnc#797523)
CVE-2013-1917-xsa44.patch (bnc#813673)
CVE-2013-1919-xsa46.patch (bnc#813675)
- Upstream patch from Jan
26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch
- bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long
latency operations are not preemptible
CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=237