Salvatore Bonaccorso
2025-May-13 06:17 UTC
[Pkg-xen-devel] Bug#1105193: xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection
Source: xen
Version: 4.20.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at
security.debian.org>
Hi,
The following vulnerability was published for xen.
CVE-2024-28956[0]:
| x86: Indirect Target Selection
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2024-28956
https://www.cve.org/CVERecord?id=CVE-2024-28956
[1] https://xenbits.xen.org/xsa/advisory-469.html
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Debian Bug Tracking System
2025-Nov-29 11:07 UTC
[Pkg-xen-devel] Bug#1105193: marked as done (xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection)
Your message dated Sat, 29 Nov 2025 11:05:44 +0000 with message-id <E1vPIls-002ALA-1I at fasolo.debian.org> and subject line Bug#1105193: fixed in xen 4.20.2+7-g1badcf5035-1 has caused the Debian Bug report #1105193, regarding xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1105193: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso <carnil at debian.org> Subject: xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection Date: Tue, 13 May 2025 08:17:37 +0200 Size: 2134 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20251129/9b17adfa/attachment-0002.eml> -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters <ftpmaster at ftp-master.debian.org> Subject: Bug#1105193: fixed in xen 4.20.2+7-g1badcf5035-1 Date: Sat, 29 Nov 2025 11:05:44 +0000 Size: 7894 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20251129/9b17adfa/attachment-0003.eml>
Debian Bug Tracking System
2025-Dec-05 16:05 UTC
[Pkg-xen-devel] Bug#1105193: marked as done (xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection)
Your message dated Fri, 05 Dec 2025 16:03:34 +0000 with message-id <E1vRYHO-0011zv-38 at fasolo.debian.org> and subject line Bug#1105193: fixed in xen 4.17.5+72-g01140da4e8-1 has caused the Debian Bug report #1105193, regarding xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 1105193: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso <carnil at debian.org> Subject: xen: CVE-2024-28956: XSA-469: x86: Indirect Target Selection Date: Tue, 13 May 2025 08:17:37 +0200 Size: 2134 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20251205/08ad3e5f/attachment.eml> -------------- next part -------------- An embedded message was scrubbed... From: Debian FTP Masters <ftpmaster at ftp-master.debian.org> Subject: Bug#1105193: fixed in xen 4.17.5+72-g01140da4e8-1 Date: Fri, 05 Dec 2025 16:03:34 +0000 Size: 8539 URL: <http://alioth-lists.debian.net/pipermail/pkg-xen-devel/attachments/20251205/08ad3e5f/attachment-0001.eml>
Reasonably Related Threads
- Bug#1031567: xen: CVE-2022-27672: XSA-426: x86: Cross-Thread Return Address Predictions
- Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
- Bug#1056928: xen: CVE-2023-46835 CVE-2023-46836
- Bug#1029830: xen: CVE-2022-42330
- Bug#859560: xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212)