File _patchinfo of Package patchinfo.28173
<patchinfo incident="28173">
<issue tracker="bnc" id="1209188">VUL-0: secure boot key rotation for 202211 boothole4</issue>
<issue tracker="bnc" id="1209017">VUL-0: EMBARGOED: CVE-2022-42332: xen: x86 shadow plus log-dirty mode use-after-free (XSA-427)</issue>
<issue tracker="bnc" id="1209019">VUL-0: EMBARGOED: CVE-2022-42331: xen: x86: speculative vulnerability in 32bit SYSCALL path (XSA-429)</issue>
<issue tracker="bnc" id="1209018">VUL-0: EMBARGOED: CVE-2022-42333,CVE-2022-42334: xen: x86/HVM pinned cache attributes mis-handling (XSA-428)</issue>
<issue tracker="cve" id="2022-42333"/>
<issue tracker="cve" id="2022-42334"/>
<issue tracker="cve" id="2022-42332"/>
<issue tracker="cve" id="2022-42331"/>
<packager>charlesa</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for xen</summary>
<description>This update for xen fixes the following issues:
- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-42333,CVE-2022-42334: Fixed x86/HVM pinned cache attributes mis-handling (bsc#1209018).
- CVE-2022-42331: Fixed speculative vulnerability in 32bit SYSCALL path on x86 (bsc#1209019).
</description>
<reboot_needed/>
</patchinfo>