[Git][security-tracker-team/security-tracker][master] xen fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Dec 23 11:49:03 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
64e2ebf0 by Moritz Muehlenhoff at 2024-12-23T12:48:44+01:00
xen fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -11501,12 +11501,12 @@ CVE-2024-49369 (Icinga is a monitoring system which checks the availability of n
 	NOTE: Fixed by: https://github.com/Icinga/icinga2/commit/8fed6608912c752b337d977f730547875a820831 (v2.11.12)
 CVE-2024-45819 (PVH guests have their ACPI tables constructed by the toolstack.  The c ...)
 	[experimental] - xen 4.19.1-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-464.html
 CVE-2024-45818 (The hypervisor contains code to accelerate VGA memory accesses for HVM ...)
 	[experimental] - xen 4.19.1-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-463.html
 CVE-2024-9836 (The RSS Feed Widget WordPress plugin before 3.0.0 does not validate an ...)
@@ -24717,7 +24717,7 @@ CVE-2024-38324 (IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor
 	NOT-FOR-US: IBM
 CVE-2024-45817 (In x86's APIC (Advanced Programmable Interrupt Controller) architectur ...)
 	[experimental] - xen 4.19.1-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-462.html
 CVE-2024-9123 (Integer overflow in Skia in Google Chrome prior to 129.0.6668.70 allow ...)
@@ -73263,7 +73263,7 @@ CVE-2024-2201 (A cross-privilege Spectre v2 vulnerability allows attackers to by
 	{DSA-5658-1}
 	- linux 6.8.9-1
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <end-of-life> (DSA 4677-1)
@@ -73272,12 +73272,12 @@ CVE-2024-2201 (A cross-privilege Spectre v2 vulnerability allows attackers to by
 	NOTE: https://xenbits.xen.org/xsa/advisory-456.html
 CVE-2024-31146 (When multiple devices share resources and one of them is to be passed  ...)
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-461.html
 CVE-2024-31145 (Certain PCI devices in a system might be assigned Reserved Memory Regi ...)
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-460.html
 CVE-2024-31144 [Xapi: Metadata injection attack against backup/restore functionality]
@@ -73285,13 +73285,13 @@ CVE-2024-31144 [Xapi: Metadata injection attack against backup/restore functiona
 	NOTE: https://xenbits.xen.org/xsa/advisory-459.html
 CVE-2024-31143 (An optional feature of PCI MSI called "Multiple Message" allows a devi ...)
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-458.html
 CVE-2024-31142 (Because of a logical error in XSA-407 (Branch Type Confusion), the mit ...)
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <end-of-life> (DSA 4677-1)
@@ -81803,7 +81803,7 @@ CVE-2023-28746 (Information exposure through microarchitectural state after tran
 	- linux 6.7.9-2
 	[bookworm] - linux 6.1.82-1
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <end-of-life> (DSA 4677-1)
@@ -81815,7 +81815,7 @@ CVE-2023-28746 (Information exposure through microarchitectural state after tran
 CVE-2024-2193 (A Speculative Race Condition (SRC) vulnerability that impacts modern C ...)
 	- linux <unfixed>
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <end-of-life> (DSA 4677-1)
@@ -93388,7 +93388,7 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below passes the authentication tok
 	NOT-FOR-US: CloudLinux CageFS
 CVE-2023-46842 (Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit a ...)
 	[experimental] - xen 4.19.0+14-g0918434e0f-1~exp1
-	- xen <unfixed>
+	- xen 4.19.1-1
 	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64e2ebf06f1ec820a5500282f49cb36cbd887e5d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64e2ebf06f1ec820a5500282f49cb36cbd887e5d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241223/edb3d415/attachment.htm>


More information about the debian-security-tracker-commits mailing list