File _patchinfo of Package patchinfo.8224

<patchinfo incident="8224">
  <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue>
  <issue id="1074562" tracker="bnc">VUL-0: xen: Information leak via side effects of speculative execution (XSA-254)</issue>
  <issue id="1079730" tracker="bnc">[migration][xen] xen be: qdisk-51712: error: Failed to get "write" lock</issue>
  <issue id="1092631" tracker="bnc">VUL-0: CVE-2018-3639:  xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263)</issue>
  <issue id="2017-5715" tracker="cve" />
  <issue id="2017-5753" tracker="cve" />
  <issue id="2017-5754" tracker="cve" />
  <issue id="2018-3639" tracker="cve" />
  <category>security</category>
  <rating>important</rating>
  <packager>jsegitz</packager>
  <summary>Security update for xen</summary>
  <description>This update for xen to version 4.10.1 fixes several issues (bsc#1027519).

These security issues were fixed:

- CVE-2018-3639: Prevent attackers with local user access from extracting
  information via a side-channel analysis, aka Speculative Store Bypass (SSB),
  Variant 4 (bsc#1092631).
- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations
  (bsc#1074562).

This non-security issue was fixed:

- Always call qemus xen-save-devices-state in suspend/resume to
  fix migration with qcow2 images (bsc#1079730)
  </description>
</patchinfo>
openSUSE Build Service is sponsored by