File _patchinfo of Package patchinfo.7673

<patchinfo incident="7673">
  <issue id="1074562" tracker="bnc">VUL-0: xen: Information leak via side effects of speculative execution (XSA-254)</issue>
  <issue id="1092631" tracker="bnc">VUL-0: CVE-2018-3639:  xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263)</issue>
  <issue id="2017-5715" tracker="cve" />
  <issue id="2017-5753" tracker="cve" />
  <issue id="2017-5754" tracker="cve" />
  <issue id="2018-3639" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>jsegitz</packager>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes several issues.

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).
  </description>
</patchinfo>
openSUSE Build Service is sponsored by