[Secure-testing-commits] r53184 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Wed Jul 5 09:10:18 UTC 2017
Author: sectracker
Date: 2017-07-05 09:10:18 +0000 (Wed, 05 Jul 2017)
New Revision: 53184
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-07-05 07:36:38 UTC (rev 53183)
+++ data/CVE/list 2017-07-05 09:10:18 UTC (rev 53184)
@@ -1,3 +1,11 @@
+CVE-2017-10927
+ RESERVED
+CVE-2017-10926
+ RESERVED
+CVE-2017-10925
+ RESERVED
+CVE-2017-10924
+ RESERVED
CVE-2017-10910
RESERVED
CVE-2017-10909
@@ -2466,47 +2474,47 @@
{DSA-3895-1}
- flatpak 0.8.7-1 (bug #865413)
NOTE: https://github.com/flatpak/flatpak/issues/845
-CVE-2017-10923 [XSA 225]
+CVE-2017-10923 (Xen through 4.8.x does not validate a vCPU array index upon the sending ...)
- xen <unfixed>
[jessie] - xen <not-affected> (Vulnerable code not present)
[wheezy] - xen <not-affected> (Vulnerable code not present)
NOTE: https://xenbits.xen.org/xsa/advisory-225.html
-CVE-2017-10922 [XSA 224: bug 3]
+CVE-2017-10922 (The grant-table feature in Xen through 4.8.x mishandles MMIO region ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10921 [XSA 224: bug 2]
+CVE-2017-10921 (The grant-table feature in Xen through 4.8.x does not ensure sufficient ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10920 [XSA 224: bug 1]
+CVE-2017-10920 (The grant-table feature in Xen through 4.8.x mishandles a ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10919 [XSA 223]
+CVE-2017-10919 (Xen through 4.8.x mishandles virtual interrupt injection, which allows ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-223.html
-CVE-2017-10918 [XSA 222]
+CVE-2017-10918 (Xen through 4.8.x does not validate memory allocations during certain ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-222.html
-CVE-2017-10917 [XSA 221]
+CVE-2017-10917 (Xen through 4.8.x does not validate the port numbers of polled event ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-221.html
-CVE-2017-10916 [XSA 220]
+CVE-2017-10916 (The vCPU context-switch implementation in Xen through 4.8.x improperly ...)
- xen <unfixed>
[jessie] - xen <not-affected> (Vulnerable code not present)
[wheezy] - xen <not-affected> (Vulnerable code not present)
NOTE: https://xenbits.xen.org/xsa/advisory-220.html
-CVE-2017-10915 [XSA 219]
+CVE-2017-10915 (The shadow-paging feature in Xen through 4.8.x mismanages page ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-219.html
-CVE-2017-10914 [XSA 218: bug 2]
+CVE-2017-10914 (The grant-table feature in Xen through 4.8.x has a race condition ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10913 [XSA 218: bug 1]
+CVE-2017-10913 (The grant-table feature in Xen through 4.8.x provides false mapping ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10912 [XSA 217]
+CVE-2017-10912 (Xen through 4.8.x mishandles page transfer, which allows guest OS users ...)
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-217.html
-CVE-2017-10911 [XSA 216]
+CVE-2017-10911 (The make_response function in drivers/block/xen-blkback/blkback.c in ...)
- linux <unfixed>
- qemu <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-216.html
More information about the Secure-testing-commits
mailing list