- add xorg-x11-util-devel to BuildRequires to get lndir(1)
- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch It changed migration protocol and upstream wants a different solution - bnc#802221 - fix xenpaging readd xenpaging.qemu.flush-cache.patch - Upstream patches from Jan 26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch 26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch - Additional fix for bnc#816159 CVE-2013-1918-xsa45-followup.patch - bnc#817068 - Xen guest with >1 sr-iov vf won't start xen-managed-pci-device.patch - Update to Xen 4.2.2 c/s 26064 The following recent security patches are included in the tarball CVE-2013-0151-xsa34.patch (bnc#797285) CVE-2012-6075-xsa41.patch (bnc#797523) CVE-2013-1917-xsa44.patch (bnc#813673) CVE-2013-1919-xsa46.patch (bnc#813675) - Upstream patch from Jan 26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch - bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long latency operations are not preemptible CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=237
This commit is contained in:
100
xen.changes
100
xen.changes
@@ -1,3 +1,103 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon May 6 15:52:03 CEST 2013 - ohering@suse.de
|
||||
|
||||
- add xorg-x11-util-devel to BuildRequires to get lndir(1)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon May 6 11:45:03 CEST 2013 - ohering@suse.de
|
||||
|
||||
- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch
|
||||
It changed migration protocol and upstream wants a different solution
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Sun May 5 16:20:30 CEST 2013 - ohering@suse.de
|
||||
|
||||
- bnc#802221 - fix xenpaging
|
||||
readd xenpaging.qemu.flush-cache.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 30 09:15:26 MDT 2013 - carnold@suse.com
|
||||
|
||||
- Upstream patches from Jan
|
||||
26891-x86-S3-Fix-cpu-pool-scheduling-after-suspend-resume.patch
|
||||
26930-x86-EFI-fix-runtime-call-status-for-compat-mode-Dom0.patch
|
||||
- Additional fix for bnc#816159
|
||||
CVE-2013-1918-xsa45-followup.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 29 15:40:35 MDT 2013 - cyliu@suse.com
|
||||
|
||||
- bnc#817068 - Xen guest with >1 sr-iov vf won't start
|
||||
xen-managed-pci-device.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 29 11:21:54 MDT 2013 - carnold@suse.com
|
||||
|
||||
- Update to Xen 4.2.2 c/s 26064
|
||||
The following recent security patches are included in the tarball
|
||||
CVE-2013-0151-xsa34.patch (bnc#797285)
|
||||
CVE-2012-6075-xsa41.patch (bnc#797523)
|
||||
CVE-2013-1917-xsa44.patch (bnc#813673)
|
||||
CVE-2013-1919-xsa46.patch (bnc#813675)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Apr 24 08:07:07 MDT 2013 - carnold@suse.com
|
||||
|
||||
- Upstream patch from Jan
|
||||
26902-x86-EFI-pass-boot-services-variable-info-to-runtime-code.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Apr 19 14:22:43 MDT 2013 - carnold@suse.com
|
||||
|
||||
- bnc#816159 - VUL-0: xen: CVE-2013-1918: XSA-45: Several long
|
||||
latency operations are not preemptible
|
||||
CVE-2013-1918-xsa45-1-vcpu-destroy-pagetables-preemptible.patch
|
||||
CVE-2013-1918-xsa45-2-new-guest-cr3-preemptible.patch
|
||||
CVE-2013-1918-xsa45-3-new-user-base-preemptible.patch
|
||||
CVE-2013-1918-xsa45-4-vcpu-reset-preemptible.patch
|
||||
CVE-2013-1918-xsa45-5-set-info-guest-preemptible.patch
|
||||
CVE-2013-1918-xsa45-6-unpin-preemptible.patch
|
||||
CVE-2013-1918-xsa45-7-mm-error-paths-preemptible.patch
|
||||
- bnc#816163 - VUL-0: xen: CVE-2013-1952: XSA-49: VT-d interrupt
|
||||
remapping source validation flaw for bridges
|
||||
CVE-2013-1952-xsa49.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 18 10:17:08 MDT 2013 - cyliu@suse.com
|
||||
|
||||
- bnc#809662 - can't use pv-grub to start domU (pygrub does work)
|
||||
xen.spec
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 14:47:41 MDT 2013 - carnold@suse.com
|
||||
|
||||
- bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2
|
||||
on Kyoto
|
||||
xend-cpuinfo-model-name.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Apr 15 10:55:17 MDT 2013 - carnold@suse.com
|
||||
|
||||
- bnc#813673 - VUL-0: CVE-2013-1917: xen: Xen PV DoS vulnerability with
|
||||
SYSENTER
|
||||
CVE-2013-1917-xsa44.patch
|
||||
- bnc#813675 - VUL-0: CVE-2013-1919: xen: Several access permission
|
||||
issues with IRQs for unprivileged guests
|
||||
CVE-2013-1919-xsa46.patch
|
||||
- bnc#814059 - VUL-1: xen: qemu-nbd format-guessing due to missing
|
||||
format specification
|
||||
CVE-2013-1922-xsa48.patch
|
||||
- Upstream patches from Jan
|
||||
26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
|
||||
26751-x86-EFI-permit-setting-variable-with-non-zero-attributes.patch
|
||||
26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
|
||||
26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
|
||||
26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
|
||||
26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
|
||||
26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
|
||||
26774-defer-event-channel-bucket-pointer-store-until-after-XSM-checks.patch
|
||||
26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 4 11:17:43 MDT 2013 - carnold@suse.com
|
||||
|
||||
|
Reference in New Issue
Block a user