Overview

Request 614322 accepted

- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
Bypass aka "Memory Disambiguation"
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
- Upstream patches from Jan (bsc#1027519)
- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
- Update to Xen 4.10.1 bug fix release (bsc#1027519)
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
unbounded loop (XSA-262)

Loading...
Request History
Andreas Stieger's avatar

AndreasStieger created request

- bsc#1092631 - VUL-0: CVE-2018-3639: xen: V4 – Speculative Store
Bypass aka "Memory Disambiguation"
- Always call qemus xen-save-devices-state in suspend/resume to
fix migration with qcow2 images (bsc#1079730)
- Upstream patches from Jan (bsc#1027519)
- Fixes related to Page Table Isolation (XPTI). bsc#1074562 XSA-254
- Update to Xen 4.10.1 bug fix release (bsc#1027519)
- bsc#1090822 - VUL-0: CVE-2018-10982: xen: x86 vHPET interrupt
injection errors (XSA-261)
- bsc#1090823 - VUL-0: CVE-2018-10981: xen: qemu may drive Xen into
unbounded loop (XSA-262)


Saul Goodman's avatar

licensedigger accepted review

ok


Maintenance Bot's avatar

maintbot accepted review

ok


Maintenance Bot's avatar

maintbot approved review

ok


Johannes Segitz's avatar

jsegitz moved maintenance target to openSUSE:Maintenance:8224


Johannes Segitz's avatar

jsegitz accepted request

openSUSE Build Service is sponsored by