[Secure-testing-commits] r53184 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Wed Jul 5 09:10:18 UTC 2017


Author: sectracker
Date: 2017-07-05 09:10:18 +0000 (Wed, 05 Jul 2017)
New Revision: 53184

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-07-05 07:36:38 UTC (rev 53183)
+++ data/CVE/list	2017-07-05 09:10:18 UTC (rev 53184)
@@ -1,3 +1,11 @@
+CVE-2017-10927
+	RESERVED
+CVE-2017-10926
+	RESERVED
+CVE-2017-10925
+	RESERVED
+CVE-2017-10924
+	RESERVED
 CVE-2017-10910
 	RESERVED
 CVE-2017-10909
@@ -2466,47 +2474,47 @@
 	{DSA-3895-1}
 	- flatpak 0.8.7-1 (bug #865413)
 	NOTE: https://github.com/flatpak/flatpak/issues/845
-CVE-2017-10923 [XSA 225]
+CVE-2017-10923 (Xen through 4.8.x does not validate a vCPU array index upon the sending ...)
 	- xen <unfixed>
 	[jessie] - xen <not-affected> (Vulnerable code not present)
 	[wheezy] - xen <not-affected> (Vulnerable code not present)
 	NOTE: https://xenbits.xen.org/xsa/advisory-225.html
-CVE-2017-10922 [XSA 224: bug 3]
+CVE-2017-10922 (The grant-table feature in Xen through 4.8.x mishandles MMIO region ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10921 [XSA 224: bug 2]
+CVE-2017-10921 (The grant-table feature in Xen through 4.8.x does not ensure sufficient ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10920 [XSA 224: bug 1]
+CVE-2017-10920 (The grant-table feature in Xen through 4.8.x mishandles a ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10919 [XSA 223]
+CVE-2017-10919 (Xen through 4.8.x mishandles virtual interrupt injection, which allows ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-223.html
-CVE-2017-10918 [XSA 222]
+CVE-2017-10918 (Xen through 4.8.x does not validate memory allocations during certain ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-222.html
-CVE-2017-10917 [XSA 221]
+CVE-2017-10917 (Xen through 4.8.x does not validate the port numbers of polled event ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-221.html
-CVE-2017-10916 [XSA 220]
+CVE-2017-10916 (The vCPU context-switch implementation in Xen through 4.8.x improperly ...)
 	- xen <unfixed>
 	[jessie] - xen <not-affected> (Vulnerable code not present)
 	[wheezy] - xen <not-affected> (Vulnerable code not present)
 	NOTE: https://xenbits.xen.org/xsa/advisory-220.html
-CVE-2017-10915 [XSA 219]
+CVE-2017-10915 (The shadow-paging feature in Xen through 4.8.x mismanages page ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-219.html
-CVE-2017-10914 [XSA 218: bug 2]
+CVE-2017-10914 (The grant-table feature in Xen through 4.8.x has a race condition ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10913 [XSA 218: bug 1]
+CVE-2017-10913 (The grant-table feature in Xen through 4.8.x provides false mapping ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10912 [XSA 217]
+CVE-2017-10912 (Xen through 4.8.x mishandles page transfer, which allows guest OS users ...)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-217.html
-CVE-2017-10911 [XSA 216]
+CVE-2017-10911 (The make_response function in drivers/block/xen-blkback/blkback.c in ...)
 	- linux <unfixed>
 	- qemu <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-216.html




More information about the Secure-testing-commits mailing list