File _patchinfo of Package patchinfo.31417
<patchinfo incident="31417">
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
<issue tracker="bnc" id="1215145">VUL-0: CVE-2023-34322: xen: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438)</issue>
<issue tracker="bnc" id="1216807">VUL-0: EMBARGOED: CVE-2023-46836: xen: x86: BTC/SRSO fixes not fully effective (XSA-446)</issue>
<issue tracker="bnc" id="1215746">VUL-0: CVE-2023-34326: xen: x86/AMD: missing IOMMU TLB flushing (XSA-442)</issue>
<issue tracker="bnc" id="1215474">VUL-0: CVE-2023-20588: xen: AMD CPU transitional execution leak via division by zero</issue>
<issue tracker="bnc" id="1215748">VUL-0: CVE-2023-34327,CVE-2023-34328: xen: x86/AMD: Debug Mask handling (XSA-444)</issue>
<issue tracker="bnc" id="1216654">VUL-0: EMBARGOED: CVE-2023-46835: xen: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445)</issue>
<issue tracker="bnc" id="1215747">VUL-0: CVE-2023-34325: xen: Multiple vulnerabilities in libfsimage disk handling (XSA-443)</issue>
<issue tracker="cve" id="2023-34326"/>
<issue tracker="cve" id="2023-34325"/>
<issue tracker="cve" id="2023-20588"/>
<issue tracker="cve" id="2023-46835"/>
<issue tracker="cve" id="2023-34322"/>
<issue tracker="cve" id="2023-34327"/>
<issue tracker="cve" id="2023-46836"/>
<issue tracker="cve" id="2023-34328"/>
<packager>charlesa</packager>
<rating>important</rating>
<category>security</category>
<reboot_needed/>
<summary>Security update for xen</summary>
<description>This update for xen fixes the following issues:
- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).
- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).
- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).
- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).
- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).
- Upstream bug fixes (bsc#1027519)
</description>
</patchinfo>