SUSE-SU-2019:1371-1 -- SLES xenID: oval:org.secpod.oval:def:89003466 | Date: (C)2021-02-27 (M)2024-04-17 |
Class: PATCH | Family: unix |
This update for xen fixes the following issues: Four new speculative execution information leak issues have been identified in Intel CPUs. - CVE-2018-12126: Microarchitectural Store Buffer Data Sampling - CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling - CVE-2018-12130: Microarchitectural Load Port Data Sampling - CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory These updates contain the XEN Hypervisor adjustments, that additionally also use CPU Microcode updates. The mitigation can be controlled via the quot;mdsquot; commandline option, see the documentation. For more information on this set of vulnerabilities, check out https://www.suse.com/support/kb/doc/?id=7023736 Other fixes: - CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob . - Fixed an issue with live migration when spectre is enabled on xen boot cmdline . - Fixed an issue with live migration . - Added upstream bug fix .
Platform: |
SUSE Linux Enterprise Server 12 SP2 |