↵ Return to the main page of xen-doc
View build
Search for updates
Package Info
🠗 Changelog
🠗 Dependencies
🠗 Provides
🠗 Files
Date | Author | Change |
---|---|---|
2024-09-24 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.3-2 | - x86: Deadlock in vlapic_error() [XSA-462, CVE-2024-45817] |
2024-09-13 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.3-1 | - update to xen-4.18.3 remove or adjust patches now included or superceded upstream now need to enable systemd explicitly |
2024-08-15 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.2-5 | - error handling in x86 IOMMU identity mapping [XSA-460, CVE-2024-31145] - PCI device pass-through with shared resources [XSA-461, CVE-2024-31146] |
2024-07-16 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.2-4 | - double unlock in x86 guest IRQ handling [XSA-458, CVE-2024-31143] (#2298690) |
2024-06-07 | Python Maint <python dash maint at redhat dot com> - 4.18.2-3 | - Rebuilt for Python 3.13 |
2024-06-03 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.2-2 | - x86: Native Branch History Injection [XSA-456 version 3, CVE-2024-2201] |
2024-04-09 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.2-1 | - x86: Native Branch History Injection [XSA-456, CVE-2024-2201] - update to xen 4.18.2, remove patches now included upstream |
2024-04-09 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.1-2 | - x86 HVM hypercalls may trigger Xen bug check [XSA-454, CVE-2023-46842] - x86: Incorrect logic for BTC/SRSO mitigations [XSA-455, CVE-2024-31142] |
2024-03-20 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.1-1 | - update to xen-4.18.1 rebase xen.gcc12.fixes.patch remove patches now included or superceded upstream |
2024-03-13 | Michael Young <m dot a dot young at durham dot ac dot uk> - 4.18.0-7 | - x86: Register File Data Sampling [XSA-452, CVE-2023-28746] - GhostRace: Speculative Race Conditions [XSA-453, CVE-2024-2193] - additional patches so above applies cleanly |