[Git][security-tracker-team/security-tracker][master] Add fixed version for src:xen in unstable
Salvatore Bonaccorso
carnil at debian.org
Sat Jul 14 23:16:47 BST 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6d8c84b1 by Salvatore Bonaccorso at 2018-07-15T00:14:16+02:00
Add fixed version for src:xen in unstable
At point release time for 9.5 given there was no more recent version in
unstable for src:xen the package from stable was propped up from stable
to unstable.
As such mark for evey uploaded version which fix a set of CVE with the
respective version from stable, which is now as well in unstable.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -2586,15 +2586,15 @@ CVE-2018-12894
RESERVED
CVE-2018-12893 (An issue was discovered in Xen through 4.10.x. One of the fixes in ...)
{DSA-4236-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
NOTE: https://xenbits.xen.org/xsa/advisory-265.html
CVE-2018-12892 (An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass ...)
{DSA-4236-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
NOTE: https://xenbits.xen.org/xsa/advisory-266.html
CVE-2018-12891 (An issue was discovered in Xen through 4.10.x. Certain PV MMU ...)
{DSA-4236-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9
NOTE: https://xenbits.xen.org/xsa/advisory-264.html
CVE-2018-12890
RESERVED
@@ -7661,11 +7661,11 @@ CVE-2018-10992 (lilypond-invoke-editor in LilyPond 2.19.80 does not validate str
[wheezy] - lilypond <not-affected> (Incomplete fix not applied)
CVE-2018-10982 (An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS ...)
{DSA-4201-1 DLA-1383-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
NOTE: https://xenbits.xen.org/xsa/advisory-261.html
CVE-2018-10981 (An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS ...)
{DSA-4201-1 DLA-1383-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
NOTE: https://xenbits.xen.org/xsa/advisory-262.html
CVE-2018-10980
RESERVED
@@ -9119,12 +9119,12 @@ CVE-2017-18262 (Blackboard Learn (Since at least 17th of October 2017) has allow
NOT-FOR-US: Blackboard Learn
CVE-2018-10471 (An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS ...)
{DSA-4201-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
[wheezy] - xen <not-affected> (Regression for XSA-254 which was not applied in wheezy)
NOTE: https://xenbits.xen.org/xsa/advisory-259.html
CVE-2018-10472 (An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS ...)
{DSA-4201-1}
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
[wheezy] - xen <not-affected> (No QMP support in wheezy)
NOTE: https://xenbits.xen.org/xsa/advisory-258.html
CVE-2018-10432
@@ -12965,7 +12965,7 @@ CVE-2018-8897 (A statement in the System Programming Guide of the Intel 64 and I
{DSA-4201-1 DSA-4196-1 DLA-1392-1 DLA-1383-1}
- linux 4.15.17-1
NOTE: Fixed by: https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 (4.16-rc7)
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
NOTE: https://xenbits.xen.org/xsa/advisory-260.html
NOTE: http://www.openwall.com/lists/oss-security/2018/05/08/4
CVE-2018-8896 (In 2345 Security Guard 3.6, the driver file (2345DumpBlock.sys) allows ...)
@@ -27797,7 +27797,7 @@ CVE-2018-3666
CVE-2018-3665 (System software utilizing Lazy FP state restore technique on systems ...)
{DSA-4232-1 DLA-1422-1}
- linux 4.6.1-1
- - xen <unfixed>
+ - xen 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8
NOTE: https://xenbits.xen.org/xsa/advisory-267.html
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
NOTE: Default eagerfpu=on on all CPUs: https://git.kernel.org/linus/58122bf1d856a4ea9581d62a07c557d997d46a19
@@ -27861,7 +27861,7 @@ CVE-2018-3639 (Systems with microprocessors utilizing speculative execution and
- linux 4.16.12-1
[stretch] - linux 4.9.107-1
[wheezy] - linux <ignored> (Too much work to backport)
- - xen <unfixed>
+ - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u7
NOTE: https://xenbits.xen.org/xsa/advisory-263.html
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6d8c84b1f4f6b8d432515d103394984b88e4f315
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6d8c84b1f4f6b8d432515d103394984b88e4f315
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180714/63dbf2b5/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list