Author: sectracker
Date: 2017-07-05 09:10:18 +0000 (Wed, 05 Jul 2017)
New Revision: 53184

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-07-05 07:36:38 UTC (rev 53183)
+++ data/CVE/list       2017-07-05 09:10:18 UTC (rev 53184)
@@ -1,3 +1,11 @@
+CVE-2017-10927
+       RESERVED
+CVE-2017-10926
+       RESERVED
+CVE-2017-10925
+       RESERVED
+CVE-2017-10924
+       RESERVED
 CVE-2017-10910
        RESERVED
 CVE-2017-10909
@@ -2466,47 +2474,47 @@
        {DSA-3895-1}
        - flatpak 0.8.7-1 (bug #865413)
        NOTE: https://github.com/flatpak/flatpak/issues/845
-CVE-2017-10923 [XSA 225]
+CVE-2017-10923 (Xen through 4.8.x does not validate a vCPU array index upon 
the sending ...)
        - xen <unfixed>
        [jessie] - xen <not-affected> (Vulnerable code not present)
        [wheezy] - xen <not-affected> (Vulnerable code not present)
        NOTE: https://xenbits.xen.org/xsa/advisory-225.html
-CVE-2017-10922 [XSA 224: bug 3]
+CVE-2017-10922 (The grant-table feature in Xen through 4.8.x mishandles MMIO 
region ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10921 [XSA 224: bug 2]
+CVE-2017-10921 (The grant-table feature in Xen through 4.8.x does not ensure 
sufficient ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10920 [XSA 224: bug 1]
+CVE-2017-10920 (The grant-table feature in Xen through 4.8.x mishandles a ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-224.html
-CVE-2017-10919 [XSA 223]
+CVE-2017-10919 (Xen through 4.8.x mishandles virtual interrupt injection, 
which allows ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-223.html
-CVE-2017-10918 [XSA 222]
+CVE-2017-10918 (Xen through 4.8.x does not validate memory allocations during 
certain ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-222.html
-CVE-2017-10917 [XSA 221]
+CVE-2017-10917 (Xen through 4.8.x does not validate the port numbers of polled 
event ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-221.html
-CVE-2017-10916 [XSA 220]
+CVE-2017-10916 (The vCPU context-switch implementation in Xen through 4.8.x 
improperly ...)
        - xen <unfixed>
        [jessie] - xen <not-affected> (Vulnerable code not present)
        [wheezy] - xen <not-affected> (Vulnerable code not present)
        NOTE: https://xenbits.xen.org/xsa/advisory-220.html
-CVE-2017-10915 [XSA 219]
+CVE-2017-10915 (The shadow-paging feature in Xen through 4.8.x mismanages page 
...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-219.html
-CVE-2017-10914 [XSA 218: bug 2]
+CVE-2017-10914 (The grant-table feature in Xen through 4.8.x has a race 
condition ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10913 [XSA 218: bug 1]
+CVE-2017-10913 (The grant-table feature in Xen through 4.8.x provides false 
mapping ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-218.html
-CVE-2017-10912 [XSA 217]
+CVE-2017-10912 (Xen through 4.8.x mishandles page transfer, which allows guest 
OS users ...)
        - xen <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-217.html
-CVE-2017-10911 [XSA 216]
+CVE-2017-10911 (The make_response function in 
drivers/block/xen-blkback/blkback.c in ...)
        - linux <unfixed>
        - qemu <unfixed>
        NOTE: https://xenbits.xen.org/xsa/advisory-216.html


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to