[Git][security-tracker-team/security-tracker][master] 2 commits: mark CVE-2020-8252 as not-affected
Thorsten Alteholz
alteholz at debian.org
Wed Sep 23 13:57:27 BST 2020
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4a0bd102 by Thorsten Alteholz at 2020-09-23T14:31:55+02:00
mark CVE-2020-8252 as not-affected
- - - - -
75e5491c by Thorsten Alteholz at 2020-09-23T14:34:05+02:00
mark xen CVEs as EOL in Stretch (not checked whether affected)
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -485,26 +485,32 @@ CVE-2020-25605
CVE-2020-25604 [race when migrating timers between x86 HVM vCPU-s]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-336.html
CVE-2020-25603 [Missing memory barriers when accessing/allocating an event channel]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-340.html
CVE-2020-25602 [x86 pv: Crash when handling guest access to MSR_MISC_ENABLE]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-333.html
CVE-2020-25601 [lack of preemption in evtchn_reset() / evtchn_destroy()]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-344.html
CVE-2020-25600 [out of bounds event channels available to 32-bit x86 domains]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-342.html
CVE-2020-25599 [races with evtchn_reset()]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-343.html
CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path]
RESERVED
@@ -514,14 +520,17 @@ CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path]
CVE-2020-25597 [once valid event channels may not turn invalid]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-338.html
CVE-2020-25596 [x86 pv guest kernel DoS via SYSENTER]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-339.html
CVE-2020-25595 [PCI passthrough code reading back hardware registers]
RESERVED
- xen <unfixed>
+ [stretch] - xen <end-of-life> (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-337.html
CVE-2020-25594
RESERVED
@@ -41398,6 +41407,7 @@ CVE-2020-8253 (Improper authentication in Citrix XenMobile Server 10.12 before R
NOT-FOR-US: Citrix
CVE-2020-8252 (The implementation of realpath in libuv < 10.22.1, < 12.18.4, an ...)
- libuv1 1.39.0-1
+ [stretch] - libuv1 <not-affected> (Vulnerable code introduced later)
NOTE: https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/#fs-realpath-native-on-may-cause-buffer-overflow-medium-cve-2020-8252
NOTE: Debian's version of nodejs uses the shared system library of libuv1 instead
NOTE: of the bundled one.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/de21c7d34512df5a18f1ea67aea69411c5af80f1...75e5491c4a88686257c727dd9769be42777dee8d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/de21c7d34512df5a18f1ea67aea69411c5af80f1...75e5491c4a88686257c727dd9769be42777dee8d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200923/67fd8442/attachment.html>
More information about the debian-security-tracker-commits
mailing list