Author: hle Date: 2016-11-10 09:33:21 +0000 (Thu, 10 Nov 2016) New Revision: 46095
Modified: data/CVE/list Log: CVE triage for Xen in wheezy. Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-11-10 07:57:54 UTC (rev 46094) +++ data/CVE/list 2016-11-10 09:33:21 UTC (rev 46095) @@ -21573,6 +21573,8 @@ - qemu-kvm <removed> [wheezy] - qemu-kvm <no-dsa> (Minor issue) [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) + - xen 4.4.0-1 + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1303120 NOTE: Upstream commit: http://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e (v2.6.0-rc0) @@ -25233,6 +25235,9 @@ [squeeze] - qemu <not-affected> (Vulnerable code introduced later) - qemu-kvm <removed> [squeeze] - qemu-kvm <not-affected> (Vulnerable code introduced later) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: Fixed by: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg01184.html NOTE: ahci emulation added in: http://git.qemu.org/?p=qemu.git;a=commit;h=f6ad2e32f8d833c7f1c75dc084a84a8f02704d64 (v0.14.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1288532 @@ -26249,6 +26254,9 @@ [wheezy] - qemu <not-affected> (Vulnerable code introduced later) [squeeze] - qemu <not-affected> (Vulnerable code introduced later) - qemu-kvm <not-affected> (Vulnerable code not present) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=a7278b36fcab9af469563bd7b9dadebe2ae25e48 (v2.5.0-rc0) NOTE: VMXNET3 device implementation introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=786fd2b0f87baded8c9e55307b99719eea3e016e (v1.5.0-rc0) CVE-2015-8745 [net: vmxnet3: reading IMR registers leads to a crash] @@ -26258,6 +26266,9 @@ [wheezy] - qemu <not-affected> (Vulnerable code introduced later) [squeeze] - qemu <not-affected> (Vulnerable code introduced later) - qemu-kvm <not-affected> (Vulnerable code not present) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=c6048f849c7e3f009786df76206e895a69de032c (v2.5.0-rc0) NOTE: VMXNET3 device implementation introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=786fd2b0f87baded8c9e55307b99719eea3e016e (v1.5.0-rc0) CVE-2015-8743 [net: ne2000: OOB r/w in ioport operations] @@ -28347,6 +28358,9 @@ [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/4 CVE-2015-8567 [net: vmxnet3: host memory leakage -- does not check if the device is active before activating it] @@ -28356,6 +28370,9 @@ [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/4 CVE-2015-8559 [knife bootstrap leaks validator privkey into system logs] @@ -33232,6 +33249,9 @@ - qemu-kvm <removed> [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) [squeeze] - qemu-kvm <not-affected> (Vulnerable code not present) + - xen 4.4.0-1 + [wheezy] - xen <not-affected> (Vulnerable code introduced later) + NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: Upstream commit: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=43b11a91dd861a946b231b89b7542856ade23d1b (v2.5.0-rc0) NOTE: Introduced by: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=d35e428c8400f9ddc07e5a15ff19622c869b9ba0 (v1.2.0-rc0) CVE-2015-7548 (OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before ...) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits