Security update for xen

This update for xen fixes the following issues:

Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)

- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These updates contain the XEN Hypervisor adjustments, that additionaly also use CPU Microcode updates.

The mitigation can be controlled via the "mds" commandline option, see the documentation.

For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736

Security issue fixed:

- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680)

Other fixes:

- Added code to change LIBXL_HOTPLUG_TIMEOUT at runtime.

The included README has details about the impact of this change (bsc#1120095)

This update was imported from the SUSE:SLE-12-SP3:Update update project.

Fixed bugs
bnc#1111331
VUL-0: EMBARGOED: CPU issues Q2 2019 aka "Group 4"
bnc#1027519
Xen: Missing upstream bug fixes
bnc#1130680
VUL-0: CVE-2018-20815: xen: qemu: device_tree: heap buffer overflow while loading device tree blob
bnc#1120095
L3: SLES 12 SP3 dom0 XEN host Unable to Start SLES11 SP4 VM
Selected Binaries
openSUSE Build Service is sponsored by