[Git][security-tracker-team/security-tracker][master] Several xen issues fixed in unstable
Salvatore Bonaccorso
carnil at debian.org
Wed Jun 19 16:34:49 BST 2019
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
326a3bac by Salvatore Bonaccorso at 2019-06-19T15:34:16Z
Several xen issues fixed in unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4412,7 +4412,7 @@ CVE-2019-11091 (Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Unc
{DSA-4447-1 DSA-4444-1 DLA-1799-1 DLA-1789-1 DLA-1787-1}
- intel-microcode 3.20190514.1
- linux 4.19.37-2
- - xen <unfixed> (bug #929129)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929129)
NOTE: https://git.kernel.org/linus/fa4bff165070dc40a3de35b78e4f8da8e8d85ec5
NOTE: https://software.intel.com/security-software-guidance/software-guidance/microarchitectural-data-sampling
NOTE: https://xenbits.xen.org/xsa/advisory-297.html
@@ -9125,31 +9125,31 @@ CVE-2019-9578 (In devs.c in Yubico libu2f-host before 1.1.8, the response to ini
CVE-2019-9577
RESERVED
CVE-2019-XXXX [xen: x86 shadow: Insufficient TLB flushing when using PCID]
- - xen <unfixed> (bug #929992)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929992)
NOTE: https://xenbits.xen.org/xsa/advisory-294.html
CVE-2019-XXXX [xen: x86: PV kernel context switch corruption]
- - xen <unfixed> (bug #929999)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929999)
NOTE: https://xenbits.xen.org/xsa/advisory-293.html
CVE-2019-XXXX [xen: x86: insufficient TLB flushing when using PCID]
- - xen <unfixed> (bug #929993)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929993)
NOTE: https://xenbits.xen.org/xsa/advisory-292.html
CVE-2019-XXXX [xen: x86/PV: page type reference counting issue with failed IOMMU update]
- - xen <unfixed> (bug #929995)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929995)
NOTE: https://xenbits.xen.org/xsa/advisory-291.html
CVE-2019-XXXX [xen: missing preemption in x86 PV page table unvalidation]
- - xen <unfixed> (bug #929996)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929996)
NOTE: https://xenbits.xen.org/xsa/advisory-290.html
CVE-2019-XXXX [xen: x86: Inconsistent PV IOMMU discipline]
- - xen <unfixed> (bug #929994)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929994)
NOTE: https://xenbits.xen.org/xsa/advisory-288.html
CVE-2019-XXXX [xen: x86: steal_page violates page_struct access discipline]
- - xen <unfixed> (bug #930001)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #930001)
NOTE: https://xenbits.xen.org/xsa/advisory-287.html
CVE-2019-XXXX [xen: race with pass-through device hotplug]
- - xen <unfixed> (bug #929998)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929998)
NOTE: https://xenbits.xen.org/xsa/advisory-285.html
CVE-2019-XXXX [xen: grant table transfer issues on large hosts]
- - xen <unfixed> (bug #929991)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929991)
NOTE: https://xenbits.xen.org/xsa/advisory-284.html
CVE-2019-9576 (The Blog2Social plugin before 5.0.3 for WordPress allows wp-admin/admi ...)
NOT-FOR-US: WordPress plugin blog2social
@@ -53707,7 +53707,7 @@ CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffe
{DSA-4447-1 DSA-4444-1 DLA-1799-1 DLA-1789-1 DLA-1787-1}
- intel-microcode 3.20190514.1
- linux 4.19.37-2
- - xen <unfixed> (bug #929129)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929129)
NOTE: https://git.kernel.org/linus/fa4bff165070dc40a3de35b78e4f8da8e8d85ec5
NOTE: https://software.intel.com/security-software-guidance/software-guidance/microarchitectural-data-sampling
NOTE: https://xenbits.xen.org/xsa/advisory-297.html
@@ -53722,7 +53722,7 @@ CVE-2018-12127 (Microarchitectural Load Port Data Sampling (MLPDS): Load ports o
{DSA-4447-1 DSA-4444-1 DLA-1799-1 DLA-1789-1 DLA-1787-1}
- intel-microcode 3.20190514.1
- linux 4.19.37-2
- - xen <unfixed> (bug #929129)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929129)
NOTE: https://git.kernel.org/linus/fa4bff165070dc40a3de35b78e4f8da8e8d85ec5
NOTE: https://software.intel.com/security-software-guidance/software-guidance/microarchitectural-data-sampling
NOTE: https://xenbits.xen.org/xsa/advisory-297.html
@@ -53733,7 +53733,7 @@ CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling (MSBDS): Store buf
{DSA-4447-1 DSA-4444-1 DLA-1799-1 DLA-1789-1 DLA-1787-1}
- intel-microcode 3.20190514.1
- linux 4.19.37-2
- - xen <unfixed> (bug #929129)
+ - xen 4.11.1+92-g6c33308a8d-1 (bug #929129)
NOTE: https://git.kernel.org/linus/fa4bff165070dc40a3de35b78e4f8da8e8d85ec5
NOTE: https://software.intel.com/security-software-guidance/software-guidance/microarchitectural-data-sampling
NOTE: https://xenbits.xen.org/xsa/advisory-297.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/326a3bac70feb43319f76e6bb2b67dd4291533ea
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/326a3bac70feb43319f76e6bb2b67dd4291533ea
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190619/678754ba/attachment.html>
More information about the debian-security-tracker-commits
mailing list