File _patchinfo of Package patchinfo.28173

<patchinfo incident="28173">
	  <issue tracker="bnc" id="1209188">VUL-0: secure boot key rotation for 202211 boothole4</issue>
  <issue tracker="bnc" id="1209017">VUL-0: EMBARGOED: CVE-2022-42332: xen: x86 shadow plus log-dirty mode use-after-free (XSA-427)</issue>
  <issue tracker="bnc" id="1209019">VUL-0: EMBARGOED: CVE-2022-42331: xen: x86: speculative vulnerability in 32bit SYSCALL path (XSA-429)</issue>
  <issue tracker="bnc" id="1209018">VUL-0: EMBARGOED: CVE-2022-42333,CVE-2022-42334: xen: x86/HVM pinned cache attributes mis-handling (XSA-428)</issue>
  <issue tracker="cve" id="2022-42333"/>
  <issue tracker="cve" id="2022-42334"/>
  <issue tracker="cve" id="2022-42332"/>
  <issue tracker="cve" id="2022-42331"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes the following issues:

- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-42333,CVE-2022-42334: Fixed x86/HVM pinned cache attributes mis-handling (bsc#1209018).
- CVE-2022-42331: Fixed speculative vulnerability in 32bit SYSCALL path on x86 (bsc#1209019).
</description>
<reboot_needed/>
</patchinfo>
openSUSE Build Service is sponsored by