Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f0fb8e8f by Moritz Muehlenhoff at 2023-10-14T16:20:41+02:00
xen fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1081,23 +1081,23 @@ CVE-2023-34324 [linux/xen: Possible deadlock in Linux 
kernel event handling]
        - linux <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-441.html
 CVE-2023-34328 [A PV vCPU can place a breakpoint over the live GDT]
-       - xen <unfixed>
+       - xen 4.17.2+55-g0b56bed864-1
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-444.html
 CVE-2023-34327 [An HVM vCPU can end up operating in the context of a previous 
vCPUs debug mask state]
-       - xen <unfixed>
+       - xen 4.17.2+55-g0b56bed864-1
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-444.html
 CVE-2023-34325 [Multiple vulnerabilities in libfsimage disk handling]
-       - xen <unfixed>
+       - xen 4.17.2+55-g0b56bed864-1
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-443.html
 CVE-2023-34326 [x86/AMD: missing IOMMU TLB flushing]
-       - xen <unfixed>
+       - xen 4.17.2+55-g0b56bed864-1
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-442.html
 CVE-2023-34323 [xenstored: A transaction conflict can crash C Xenstored]
-       - xen <unfixed> (unimportant)
+       - xen 4.17.2+55-g0b56bed864-1 (unimportant)
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-440.html
        NOTE: Debian uses the ocaml-based xenstored
@@ -5948,13 +5948,13 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When 
integrating Apache Axis 1.x
        NOTE: https://www.openwall.com/lists/oss-security/2023/09/05/1
        NOTE: 
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
 CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV 
guests]
-       - xen <unfixed>
+       - xen 4.17.2+55-g0b56bed864-1
        [bookworm] - xen <postponed> (Minor issue, fix along in future DSA or 
point release)
        [bullseye] - xen <postponed> (Minor issue, fix along in future DSA or 
point release)
        [buster] - xen <end-of-life> (DSA 4677-1)
        NOTE: https://xenbits.xen.org/xsa/advisory-438.html
 CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
-       - xen <unfixed> (bug #1051954)
+       - xen 4.17.2+55-g0b56bed864-1 (bug #1051954)
        [bookworm] - xen <postponed> (Minor issue, fix along in future DSA)
        [bullseye] - xen <no-dsa> (Minor issue, fix along in future DSA)
        [buster] - xen <end-of-life> (DSA 4677-1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0fb8e8fdb27dd14252d9e7aabdadb41e1ace072
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to