File _patchinfo of Package patchinfo.7652
<patchinfo incident="7652">
<issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
<issue id="1074562" tracker="bnc">VUL-0: xen: Information leak via side effects of speculative execution (XSA-254)</issue>
<issue id="1086039" tracker="bnc">Dom0 does not represent DomU cpu flags</issue>
<issue id="1092631" tracker="bnc">VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263)</issue>
<issue id="2017-5715" tracker="cve" />
<issue id="2017-5753" tracker="cve" />
<issue id="2017-5754" tracker="cve" />
<issue id="2018-3639" tracker="cve" />
<issue tracker="fate" id="325467"/>
<category>security</category>
<rating>important</rating>
<packager>jsegitz</packager>
<summary>Security update for xen</summary>
<description>This update for xen fixes several issues.
This feature was added:
- Added support for qemu monitor command
These security issues were fixed:
- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).
This non-security issue was fixed:
- bsc#1086039 - Dom0 does not represent DomU cpu flags
</description>
</patchinfo>