File _patchinfo of Package patchinfo.7652

<patchinfo incident="7652">
  <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
  <issue id="1074562" tracker="bnc">VUL-0: xen: Information leak via side effects of speculative execution (XSA-254)</issue>
  <issue id="1086039" tracker="bnc">Dom0 does not represent DomU cpu flags</issue>
  <issue id="1092631" tracker="bnc">VUL-0: CVE-2018-3639:  xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263)</issue>
  <issue id="2017-5715" tracker="cve" />
  <issue id="2017-5753" tracker="cve" />
  <issue id="2017-5754" tracker="cve" />
  <issue id="2018-3639" tracker="cve" />
  <issue tracker="fate" id="325467"/>
  <category>security</category>
  <rating>important</rating>
  <packager>jsegitz</packager>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes several issues.

This feature was added:

- Added support for qemu monitor command 

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).

This non-security issue was fixed:

- bsc#1086039 - Dom0 does not represent DomU cpu flags
  </description>
</patchinfo>
openSUSE Build Service is sponsored by