File _patchinfo of Package patchinfo.39862
<patchinfo incident="39862"> <issue tracker="bnc" id="1246112">VUL-0: xen: More AMD transient execution attacks</issue> <issue tracker="bnc" id="1238043">VUL-0: CVE-2025-1713: xen: deadlock potential with VT-d and legacy PCI device pass-through</issue> <issue tracker="bnc" id="1243117">VUL-0: CVE-2024-28956: xen: Intel CPU: Indirect Target Selection (ITS)</issue> <issue tracker="bnc" id="1234282">VUL-0: CVE-2024-53241: xen: XSA-466: Xen hypercall page unsafe against speculative attacks</issue> <issue tracker="bnc" id="1244644">VUL-0: CVE-2025-27465: xen: x86: Incorrect stubs exception handling for flags recovery (XSA-470)</issue> <issue tracker="cve" id="2025-1713"/> <issue tracker="cve" id="2024-28956"/> <issue tracker="cve" id="2025-27465"/> <packager>charlesa</packager> <rating>important</rating> <category>security</category> <summary>Security update for xen</summary> <description>This update for xen fixes the following issues: - CVE-2024-28956: Fixed Intel CPU Indirect Target Selection (ITS) (XSA-469) (bsc#1243117) - CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043) - CVE-2025-27465: Fixed x86 Incorrect stubs exception handling for flags recovery (XSA-470) (bsc#1244644) - Fixed more AMD transient execution attacks (XSA-471) (bsc#1246112) - Fixed xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282) </description> <reboot_needed/> </patchinfo>