[Git][security-tracker-team/security-tracker][master] xen fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Oct 14 15:21:54 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f0fb8e8f by Moritz Muehlenhoff at 2023-10-14T16:20:41+02:00
xen fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1081,23 +1081,23 @@ CVE-2023-34324 [linux/xen: Possible deadlock in Linux kernel event handling]
 	- linux <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-441.html
 CVE-2023-34328 [A PV vCPU can place a breakpoint over the live GDT]
-	- xen <unfixed>
+	- xen 4.17.2+55-g0b56bed864-1
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-444.html
 CVE-2023-34327 [An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state]
-	- xen <unfixed>
+	- xen 4.17.2+55-g0b56bed864-1
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-444.html
 CVE-2023-34325 [Multiple vulnerabilities in libfsimage disk handling]
-	- xen <unfixed>
+	- xen 4.17.2+55-g0b56bed864-1
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-443.html
 CVE-2023-34326 [x86/AMD: missing IOMMU TLB flushing]
-	- xen <unfixed>
+	- xen 4.17.2+55-g0b56bed864-1
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-442.html
 CVE-2023-34323 [xenstored: A transaction conflict can crash C Xenstored]
-	- xen <unfixed> (unimportant)
+	- xen 4.17.2+55-g0b56bed864-1 (unimportant)
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-440.html
 	NOTE: Debian uses the ocaml-based xenstored
@@ -5948,13 +5948,13 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x
 	NOTE: https://www.openwall.com/lists/oss-security/2023/09/05/1
 	NOTE: https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
 CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV guests]
-	- xen <unfixed>
+	- xen 4.17.2+55-g0b56bed864-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in future DSA or point release)
 	[bullseye] - xen <postponed> (Minor issue, fix along in future DSA or point release)
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-438.html
 CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
-	- xen <unfixed> (bug #1051954)
+	- xen 4.17.2+55-g0b56bed864-1 (bug #1051954)
 	[bookworm] - xen <postponed> (Minor issue, fix along in future DSA)
 	[bullseye] - xen <no-dsa> (Minor issue, fix along in future DSA)
 	[buster] - xen <end-of-life> (DSA 4677-1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231014/5c206f38/attachment.htm>


More information about the debian-security-tracker-commits mailing list