[Git][security-tracker-team/security-tracker][master] xen fixed in sid
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sat Oct 14 15:21:54 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f0fb8e8f by Moritz Muehlenhoff at 2023-10-14T16:20:41+02:00
xen fixed in sid
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1081,23 +1081,23 @@ CVE-2023-34324 [linux/xen: Possible deadlock in Linux kernel event handling]
- linux <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-441.html
CVE-2023-34328 [A PV vCPU can place a breakpoint over the live GDT]
- - xen <unfixed>
+ - xen 4.17.2+55-g0b56bed864-1
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-444.html
CVE-2023-34327 [An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state]
- - xen <unfixed>
+ - xen 4.17.2+55-g0b56bed864-1
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-444.html
CVE-2023-34325 [Multiple vulnerabilities in libfsimage disk handling]
- - xen <unfixed>
+ - xen 4.17.2+55-g0b56bed864-1
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-443.html
CVE-2023-34326 [x86/AMD: missing IOMMU TLB flushing]
- - xen <unfixed>
+ - xen 4.17.2+55-g0b56bed864-1
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-442.html
CVE-2023-34323 [xenstored: A transaction conflict can crash C Xenstored]
- - xen <unfixed> (unimportant)
+ - xen 4.17.2+55-g0b56bed864-1 (unimportant)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-440.html
NOTE: Debian uses the ocaml-based xenstored
@@ -5948,13 +5948,13 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x
NOTE: https://www.openwall.com/lists/oss-security/2023/09/05/1
NOTE: https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV guests]
- - xen <unfixed>
+ - xen 4.17.2+55-g0b56bed864-1
[bookworm] - xen <postponed> (Minor issue, fix along in future DSA or point release)
[bullseye] - xen <postponed> (Minor issue, fix along in future DSA or point release)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-438.html
CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
- - xen <unfixed> (bug #1051954)
+ - xen 4.17.2+55-g0b56bed864-1 (bug #1051954)
[bookworm] - xen <postponed> (Minor issue, fix along in future DSA)
[bullseye] - xen <no-dsa> (Minor issue, fix along in future DSA)
[buster] - xen <end-of-life> (DSA 4677-1)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231014/5c206f38/attachment.htm>
More information about the debian-security-tracker-commits
mailing list