- bsc#945164 - Xl destroy show error with kernel of SLES 12 sp1
5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch - Upstream patches from Jan 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch 55e43fd8-x86-NUMA-fix-setup_node.patch 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch - bsc#944463 - VUL-0: CVE-2015-5239: qemu-kvm: Integer overflow in vnc_client_read() and protocol_client_msg() CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch - bsc#944697 - VUL-1: CVE-2015-6815: qemu: net: e1000: infinite loop issue CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=375
This commit is contained in:
committed by
Git OBS Bridge
parent
8724a18868
commit
4a5ee0f11d
33
xen.spec
33
xen.spec
@@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package xen
|
||||
#
|
||||
# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@@ -15,7 +15,6 @@
|
||||
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
# needssslcertforbuild
|
||||
|
||||
Name: xen
|
||||
@@ -223,6 +222,13 @@ Patch18: 55a66a1e-make-rangeset_report_ranges-report-all-ranges.patch
|
||||
Patch19: 55a77e4f-dmar-device-scope-mem-leak-fix.patch
|
||||
Patch20: 55c1d83d-x86-gdt-Drop-write-only-xalloc-d-array.patch
|
||||
Patch21: 55c3232b-x86-mm-Make-hap-shadow-teardown-preemptible.patch
|
||||
Patch22: 55dc78e9-x86-amd_ucode-skip-updates-for-final-levels.patch
|
||||
Patch23: 55dc7937-x86-IO-APIC-don-t-create-pIRQ-mapping-from-masked-RTE.patch
|
||||
Patch24: 55df2f76-IOMMU-skip-domains-without-page-tables-when-dumping.patch
|
||||
Patch25: 55e43fd8-x86-NUMA-fix-setup_node.patch
|
||||
Patch26: 55e43ff8-x86-NUMA-don-t-account-hotplug-regions.patch
|
||||
Patch27: 55e593f1-x86-NUMA-make-init_node_heap-respect-Xen-heap-limit.patch
|
||||
Patch28: 5537a4d8-libxl-use-DEBUG-log-level-instead-of-INFO.patch
|
||||
Patch131: CVE-2015-4106-xsa131-9.patch
|
||||
Patch137: CVE-2015-3259-xsa137.patch
|
||||
Patch139: xsa139-qemuu.patch
|
||||
@@ -256,6 +262,10 @@ Patch261: CVE-2015-5154-qemuu-clear-DRQ-after-handling-all-expected-access
|
||||
Patch262: CVE-2015-5154-qemut-check-array-bounds-before-writing-to-io_buffer.patch
|
||||
Patch263: CVE-2015-5154-qemut-fix-START-STOP-UNIT-command-completion.patch
|
||||
Patch264: CVE-2015-5154-qemut-clear-DRQ-after-handling-all-expected-accesses.patch
|
||||
Patch265: CVE-2015-6815-qemuu-e1000-fix-infinite-loop.patch
|
||||
Patch266: CVE-2015-6815-qemut-e1000-fix-infinite-loop.patch
|
||||
Patch267: CVE-2015-5239-qemuu-limit-client_cut_text-msg-payload-size.patch
|
||||
Patch268: CVE-2015-5239-qemut-limit-client_cut_text-msg-payload-size.patch
|
||||
# Our platform specific patches
|
||||
Patch301: xen-destdir.patch
|
||||
Patch302: vif-bridge-no-iptables.patch
|
||||
@@ -351,6 +361,10 @@ Patch707: 55b0a255-x86-MSI-X-maskall.patch
|
||||
Patch708: 55b0a283-x86-MSI-X-teardown.patch
|
||||
Patch709: 55b0a2ab-x86-MSI-X-enable.patch
|
||||
Patch710: 55b0a2db-x86-MSI-track-guest-masking.patch
|
||||
# grant table performance improvements
|
||||
Patch715: 54c2553c-grant-table-use-uint16_t-consistently-for-offset-and-length.patch
|
||||
Patch716: 54ca33bc-grant-table-refactor-grant-copy-to-reduce-duplicate-code.patch
|
||||
Patch717: 54ca340e-grant-table-defer-releasing-pages-acquired-in-a-grant-copy.patch
|
||||
# ticket locks
|
||||
Patch720: 552d0fd2-x86-hvm-don-t-include-asm-spinlock-h.patch
|
||||
Patch721: 552d0fe8-x86-mtrr-include-asm-atomic.h.patch
|
||||
@@ -602,6 +616,13 @@ Authors:
|
||||
%patch19 -p1
|
||||
%patch20 -p1
|
||||
%patch21 -p1
|
||||
%patch22 -p1
|
||||
%patch23 -p1
|
||||
%patch24 -p1
|
||||
%patch25 -p1
|
||||
%patch26 -p1
|
||||
%patch27 -p1
|
||||
%patch28 -p1
|
||||
%patch131 -p1
|
||||
%patch137 -p1
|
||||
%patch139 -p1
|
||||
@@ -635,6 +656,10 @@ Authors:
|
||||
%patch262 -p1
|
||||
%patch263 -p1
|
||||
%patch264 -p1
|
||||
%patch265 -p1
|
||||
%patch266 -p1
|
||||
%patch267 -p1
|
||||
%patch268 -p1
|
||||
# Our platform specific patches
|
||||
%patch301 -p1
|
||||
%patch302 -p1
|
||||
@@ -729,6 +754,10 @@ Authors:
|
||||
%patch708 -p1
|
||||
%patch709 -p1
|
||||
%patch710 -p1
|
||||
# grant table performance improvements
|
||||
%patch715 -p1
|
||||
%patch716 -p1
|
||||
%patch717 -p1
|
||||
# ticket locks
|
||||
%patch720 -p1
|
||||
%patch721 -p1
|
||||
|
Reference in New Issue
Block a user