- Improvements to block-dmmd script
bnc#828623 - bnc#839596 - VUL-0: CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs 5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch - bnc#840592 - VUL-0: CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation CVE-2013-4355-xsa63.patch - bnc#840593 - VUL-0: CVE-2013-4356: XSA-64: xen: Memory accessible by 64-bit PV guests under live migration CVE-2013-4356-xsa64.patch - bnc#841766 - VUL-1: CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation CVE-2013-4361-xsa66.patch - bnc#833796 - L3: Xen: migration broken from xsave-capable to xsave-incapable host 52205e27-x86-xsave-initialization-improvements.patch 522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch - bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and sles11sp3 with xen environment, xen hypervisor will panic on multiple blades nPar. 523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch - bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and with xen environment, in booting stage ,xen hypervisor will panic. 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch - bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h” cannot power off system 522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=274
This commit is contained in:
committed by
Git OBS Bridge
parent
a75349e153
commit
a4d1d9fe03
65
xen.changes
65
xen.changes
@@ -1,3 +1,68 @@
|
||||
-------------------------------------------------------------------
|
||||
Wed Oct 2 15:58:47 MDT 2013 - jfehlig@suse.com
|
||||
|
||||
- Improvements to block-dmmd script
|
||||
bnc#828623
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 30 10:48:29 MDT 2013 - carnold@suse.com
|
||||
|
||||
- bnc#839596 - VUL-0: CVE-2013-1442: XSA-62: xen: Information leak
|
||||
on AVX and/or LWP capable CPUs
|
||||
5242a1b5-x86-xsave-initialize-extended-register-state-when-guests-enable-it.patch
|
||||
- bnc#840592 - VUL-0: CVE-2013-4355: XSA-63: xen: Information leaks
|
||||
through I/O instruction emulation
|
||||
CVE-2013-4355-xsa63.patch
|
||||
- bnc#840593 - VUL-0: CVE-2013-4356: XSA-64: xen: Memory accessible
|
||||
by 64-bit PV guests under live migration
|
||||
CVE-2013-4356-xsa64.patch
|
||||
- bnc#841766 - VUL-1: CVE-2013-4361: XSA-66: xen: Information leak
|
||||
through fbld instruction emulation
|
||||
CVE-2013-4361-xsa66.patch
|
||||
- bnc#833796 - L3: Xen: migration broken from xsave-capable to
|
||||
xsave-incapable host
|
||||
52205e27-x86-xsave-initialization-improvements.patch
|
||||
522dc0e6-x86-xsave-fix-migration-from-xsave-capable-to-xsave-incapable-host.patch
|
||||
- bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and
|
||||
sles11sp3 with xen environment, xen hypervisor will panic on
|
||||
multiple blades nPar.
|
||||
523172d5-x86-fix-memory-cut-off-when-using-PFN-compression.patch
|
||||
- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform
|
||||
and with xen environment, in booting stage ,xen hypervisor will
|
||||
panic.
|
||||
522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch
|
||||
- bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h”
|
||||
cannot power off system
|
||||
522d896b-x86-EFI-properly-handle-run-time-memory-regions-outside-the-1-1-map.patch
|
||||
- Upstream patches from Jan
|
||||
520119fc-xen-conring-Write-to-console-ring-even-if-console-lock-is-busted.patch
|
||||
520a2705-watchdog-crash-Always-disable-watchdog-in-console_force_unlock.patch
|
||||
522d8a1f-x86-allow-guest-to-set-clear-MSI-X-mask-bit-try-2.patch
|
||||
522dc044-xmalloc-make-whole-pages-xfree-clear-the-order-field-ab-used-by-xmalloc.patch
|
||||
522f2f9f-Nested-VMX-Clear-bit-31-of-IA32_VMX_BASIC-MSR.patch
|
||||
522f37b2-sched-arinc653-check-for-guest-data-transfer-failures.patch
|
||||
5231e090-libxc-x86-fix-page-table-creation-for-huge-guests.patch
|
||||
5231f00c-cpufreq-missing-check-of-copy_from_guest.patch
|
||||
523304b6-x86-machine_restart-must-not-call-acpi_dmar_reinstate-twice.patch
|
||||
5239a064-x86-HVM-fix-failure-path-in-hvm_vcpu_initialise.patch
|
||||
5239a076-VMX-fix-failure-path-in-construct_vmcs.patch
|
||||
523c0ed4-x86-HVM-properly-handle-wide-MMIO.patch
|
||||
523c1758-sched_credit-filter-node-affinity-mask-against-online-cpus.patch
|
||||
523ff393-x86-HVM-linear-address-must-be-canonical-for-the-whole-accessed-range.patch
|
||||
523ff3e2-x86-HVM-refuse-doing-string-operations-in-certain-situations.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 25 18:54:24 CEST 2013 - ohering@suse.de
|
||||
|
||||
- Use upstream version of unplugging in PVonHVM guests
|
||||
add 523c1834-unmodified_drivers-enable-unplug-per-default.patch
|
||||
remove disable_emulated_device.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Sep 25 16:17:37 CEST 2013 - ohering@suse.de
|
||||
|
||||
- fate#315714 - Support pvUSB in Xen HVM guests, add xen-usb.ko
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Sep 9 09:26:18 MDT 2013 - carnold@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user