Overview
Request 614322 accepted
- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
Bypass aka "Memory Disambiguation"
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
- Upstream patches from Jan (bsc#1027519)
- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
- Update to Xen 4.10.1 bug fix release (bsc#1027519)
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
unbounded loop (XSA-262)
- Created by AndreasStieger
- In state accepted
Request History
AndreasStieger created request
- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
Bypass aka "Memory Disambiguation"
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
- Upstream patches from Jan (bsc#1027519)
- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
- Update to Xen 4.10.1 bug fix release (bsc#1027519)
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
unbounded loop (XSA-262)
licensedigger accepted review
ok
maintbot accepted review
ok
maintbot approved review
ok
jsegitz moved maintenance target to openSUSE:Maintenance:8224
jsegitz accepted request