File _patchinfo of Package patchinfo.8224
<patchinfo incident="8224"> <issue id="1027519" tracker="bnc">Xen: Missing upstream bug fixes</issue> <issue id="1074562" tracker="bnc">VUL-0: xen: Information leak via side effects of speculative execution (XSA-254)</issue> <issue id="1079730" tracker="bnc">[migration][xen] xen be: qdisk-51712: error: Failed to get "write" lock</issue> <issue id="1092631" tracker="bnc">VUL-0: CVE-2018-3639: xen: V4 – Speculative Store Bypass aka "Memory Disambiguation" (XSA-263)</issue> <issue id="2017-5715" tracker="cve" /> <issue id="2017-5753" tracker="cve" /> <issue id="2017-5754" tracker="cve" /> <issue id="2018-3639" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>jsegitz</packager> <summary>Security update for xen</summary> <description>This update for xen to version 4.10.1 fixes several issues (bsc#1027519). These security issues were fixed: - CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631). - CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562). This non-security issue was fixed: - Always call qemus xen-save-devices-state in suspend/resume to fix migration with qcow2 images (bsc#1079730) </description> </patchinfo>