- Upstream or pending upstream patches from Jan
25587-fix-off-by-one-parsing-error.patch
25616-x86-MCi_CTL-default.patch
25617-vtd-qinval-addr.patch
25688-x86-nr_irqs_gsi.patch
- bnc#773393 - VUL-0: CVE-2012-3433: xen: HVM guest destroy p2m
teardown host DoS vulnerability
CVE-2012-3433-xsa11.patch
- bnc#773401 - VUL-1: CVE-2012-3432: xen: HVM guest user mode MMIO
emulation DoS
25682-x86-inconsistent-io-state.patch
- bnc#762484 - VUL-1: CVE-2012-2625: xen: pv bootloader doesn't
check the size of the bzip2 or lzma compressed kernel, leading to
denial of service
25589-pygrub-size-limits.patch
- Make it build with latest TeXLive 2012 with new package layout
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=196
23686-pygrub-solaris.patch
23697-pygrub-grub2.patch
23944-pygrub-debug.patch
23998-pygrub-GPT.patch
23999-pygrub-grub2.patch
24064-pygrub-HybridISO.patch
24401-pygrub-scrolling.patch
24402-pygrub-edit-fix.patch
24460-pygrub-extlinux.patch
24706-pygrub-extlinux.patch
- Revised version of security patch and an additional patch for
bnc#764077
x86_64-AMD-erratum-121.patch
x86_64-allow-unsafe-adjust.patch
- bnc#764077 - VUL-0: EMBARGOED: xen: XSA-9: denial of service on
older AMD systems
x86_64-AMD-erratum-121.patch
- Revised version of security patch for bnc#757537
x86_64-sysret-canonical.patch
- bnc#757537 - VUL-0: xen: CVE-2012-0217 PV guest escalation
x86_64-sysret-canonical.patch
- bnc#757970 - VUL-1: xen: guest denial of service on syscall GPF
generation
x86_64-trap-bounce-flags.patch
OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=190