- Update to Xen Version 4.6.1
xen-4.6.1-testing-src.tar.bz2 - Dropped patches now contained in tarball or unnecessary xen-4.6.0-testing-src.tar.bz2 5604f239-x86-PV-properly-populate-descriptor-tables.patch 561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch 561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch 561d20a0-x86-hide-MWAITX-from-PV-domains.patch 561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch 5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch 56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch 56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch 5632127b-x86-guard-against-undue-super-page-PTE-creation.patch 5632129c-free-domain-s-vcpu-array.patch 563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch 563212e4-xenoprof-free-domain-s-vcpu-array.patch 563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch 56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch 56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch 5641ceec-x86-HVM-always-intercept-AC-and-DB.patch 56549f24-x86-vPMU-document-as-unsupported.patch 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch xen-4.6.0-testing-src.tar.bz2 xsa155-qemut-qdisk-double-access.patch xsa155-qemut-xenfb.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa159.patch xsa160.patch xsa162-qemut.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=399
This commit is contained in:
committed by
Git OBS Bridge
parent
9b39a3d650
commit
31905d81fa
51
xen.changes
51
xen.changes
@@ -1,3 +1,54 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 11 09:29:01 MST 2016 - carnold@suse.com
|
||||
|
||||
- Update to Xen Version 4.6.1
|
||||
xen-4.6.1-testing-src.tar.bz2
|
||||
- Dropped patches now contained in tarball or unnecessary
|
||||
xen-4.6.0-testing-src.tar.bz2
|
||||
5604f239-x86-PV-properly-populate-descriptor-tables.patch
|
||||
561bbc8b-VT-d-don-t-suppress-invalidation-address-write-when-it-is-zero.patch
|
||||
561d2046-VT-d-use-proper-error-codes-in-iommu_enable_x2apic_IR.patch
|
||||
561d20a0-x86-hide-MWAITX-from-PV-domains.patch
|
||||
561e3283-x86-NUMA-fix-SRAT-table-processor-entry-parsing-and-consumption.patch
|
||||
5632118e-arm-Support-hypercall_create_continuation-for-multicall.patch
|
||||
56321222-arm-rate-limit-logging-from-unimplemented-PHYSDEVOP-and-HVMOP.patch
|
||||
56321249-arm-handle-races-between-relinquish_memory-and-free_domheap_pages.patch
|
||||
5632127b-x86-guard-against-undue-super-page-PTE-creation.patch
|
||||
5632129c-free-domain-s-vcpu-array.patch
|
||||
563212c9-x86-PoD-Eager-sweep-for-zeroed-pages.patch
|
||||
563212e4-xenoprof-free-domain-s-vcpu-array.patch
|
||||
563212ff-x86-rate-limit-logging-in-do_xen-oprof-pmu-_op.patch
|
||||
56323737-libxl-adjust-PoD-target-by-memory-fudge-too.patch
|
||||
56377442-x86-PoD-Make-p2m_pod_empty_cache-restartable.patch
|
||||
5641ceec-x86-HVM-always-intercept-AC-and-DB.patch
|
||||
56549f24-x86-vPMU-document-as-unsupported.patch
|
||||
5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch
|
||||
xen-4.6.0-testing-src.tar.bz2
|
||||
xsa155-qemut-qdisk-double-access.patch
|
||||
xsa155-qemut-xenfb.patch
|
||||
xsa155-qemuu-qdisk-double-access.patch
|
||||
xsa155-qemuu-xenfb.patch
|
||||
xsa159.patch
|
||||
xsa160.patch
|
||||
xsa162-qemut.patch
|
||||
xsa165.patch
|
||||
xsa166.patch
|
||||
xsa167.patch
|
||||
xsa168.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Feb 5 08:51:16 MST 2016 - carnold@suse.com
|
||||
|
||||
- bsc#965269 - VUL-1: CVE-2015-8619: xen: stack based OOB write in
|
||||
hmp_sendkey routine
|
||||
CVE-2015-8619-qemuu-stack-based-OOB-write-in-hmp_sendkey-routine.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Feb 4 09:26:34 MST 2016 - carnold@suse.com
|
||||
|
||||
- bsc#965156 - VUL-0: CVE-2015-6855: xen: ide: divide by zero issue
|
||||
CVE-2015-6855-qemuu-ide-divide-by-zero-issue.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Feb 3 10:47:41 MST 2016 - carnold@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user