File _patchinfo of Package patchinfo.30699

<patchinfo incident="30699">
  <issue tracker="bnc" id="1215474">VUL-0: CVE-2023-20588: xen: AMD CPU transitional execution leak via division by zero</issue>
  <issue tracker="bnc" id="1215145">VUL-0: CVE-2023-34322: xen: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438)</issue>
  <issue tracker="cve" id="2023-20588"/>
  <issue tracker="cve" id="2023-34322"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xen</summary>
  <reboot_needed/>
  <description>This update for xen fixes the following issues:

- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
</description>
</patchinfo>
openSUSE Build Service is sponsored by