Author: carnil Date: 2016-11-25 19:03:59 +0000 (Fri, 25 Nov 2016) New Revision: 46551
Modified: data/CVE/list Log: Add bug references for xen issues Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-11-25 18:22:32 UTC (rev 46550) +++ data/CVE/list 2016-11-25 19:03:59 UTC (rev 46551) @@ -336,27 +336,27 @@ CVE-2016-9386 [x86 null segments not always treated as unusable] RESERVED {DLA-720-1} - - xen <unfixed> + - xen <unfixed> (bug #845663) NOTE: https://xenbits.xen.org/xsa/advisory-191.html CVE-2016-9385 [x86 segment base write emulation lacking canonical address checks] RESERVED - - xen <unfixed> + - xen <unfixed> (bug #845665) NOTE: https://xenbits.xen.org/xsa/advisory-193.html CVE-2016-9384 [guest 32-bit ELF symbol table load leaking host data] RESERVED - - xen <unfixed> + - xen <unfixed> (bug #845667) [jessie] - xen <not-affected> (Only affects Xen >= 4.7) [wheezy] - xen <not-affected> (Only affects Xen >= 4.7) NOTE: https://xenbits.xen.org/xsa/advisory-194.html CVE-2016-9383 [x86 64-bit bit test instruction emulation broken] RESERVED {DLA-720-1} - - xen <unfixed> + - xen <unfixed> (bug #845668) NOTE: https://xenbits.xen.org/xsa/advisory-195.html CVE-2016-9382 [x86 task switch to VM86 mode mis-handled] RESERVED {DLA-720-1} - - xen <unfixed> + - xen <unfixed> (bug #845664) NOTE: https://xenbits.xen.org/xsa/advisory-192.html CVE-2016-9381 [qemu incautious about shared ring processing] RESERVED @@ -367,22 +367,22 @@ CVE-2016-9380 [delimiter injection vulnerabilities in pygrub] RESERVED {DLA-720-1} - - xen <unfixed> + - xen <unfixed> (bug #845670) NOTE: https://xenbits.xen.org/xsa/advisory-198.html CVE-2016-9379 [delimiter injection vulnerabilities in pygrub] RESERVED {DLA-720-1} - - xen <unfixed> + - xen <unfixed> (bug #845670) NOTE: https://xenbits.xen.org/xsa/advisory-198.html CVE-2016-9378 [x86 software interrupt injection mis-handled] RESERVED - - xen <unfixed> + - xen <unfixed> (bug #845669) [jessie] - xen <not-affected> (Only 4.5 onwards vulnerable) [wheezy] - xen <not-affected> (Only 4.5 onwards vulnerable) NOTE: https://xenbits.xen.org/xsa/advisory-196.html CVE-2016-9377 [x86 software interrupt injection mis-handled] RESERVED - - xen <unfixed> + - xen <unfixed> (bug #845669) [jessie] - xen <not-affected> (Only 4.5 onwards vulnerable) [wheezy] - xen <not-affected> (Only 4.5 onwards vulnerable) NOTE: https://xenbits.xen.org/xsa/advisory-196.html _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits