[Pkg-xen-devel] Processed: limit source to xen, tagging 845665, tagging 845664, tagging 845663, tagging 845668, tagging 845670

Debian Bug Tracking System owner at bugs.debian.org
Sat Dec 3 13:42:08 UTC 2016


Processing commands for control at bugs.debian.org:

> limit source xen
Limiting to bugs with field 'source' containing at least one of 'xen'
Limit currently set to 'source':'xen'

> tags 845665 + pending
Bug #845665 [src:xen] xen: CVE-2016-9385: x86 segment base write emulation lacking canonical address checks
Added tag(s) pending.
> tags 845664 + pending
Bug #845664 [src:xen] xen: CVE-2016-9382: x86 task switch to VM86 mode mis-handled
Added tag(s) pending.
> tags 845663 + pending
Bug #845663 [src:xen] xen: CVE-2016-9386: x86 null segments not always treated as unusable
Added tag(s) pending.
> tags 845668 + pending
Bug #845668 [src:xen] xen: CVE-2016-9383: x86 64-bit bit test instruction emulation broken
Added tag(s) pending.
> tags 845670 + pending
Bug #845670 [src:xen] xen: CVE-2016-9379 CVE-2016-9380: delimiter injection vulnerabilities in pygrub
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
845663: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845663
845664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845664
845665: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845665
845668: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845668
845670: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845670
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems



More information about the Pkg-xen-devel mailing list