Author: sectracker Date: 2017-07-05 09:10:18 +0000 (Wed, 05 Jul 2017) New Revision: 53184
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2017-07-05 07:36:38 UTC (rev 53183) +++ data/CVE/list 2017-07-05 09:10:18 UTC (rev 53184) @@ -1,3 +1,11 @@ +CVE-2017-10927 + RESERVED +CVE-2017-10926 + RESERVED +CVE-2017-10925 + RESERVED +CVE-2017-10924 + RESERVED CVE-2017-10910 RESERVED CVE-2017-10909 @@ -2466,47 +2474,47 @@ {DSA-3895-1} - flatpak 0.8.7-1 (bug #865413) NOTE: https://github.com/flatpak/flatpak/issues/845 -CVE-2017-10923 [XSA 225] +CVE-2017-10923 (Xen through 4.8.x does not validate a vCPU array index upon the sending ...) - xen <unfixed> [jessie] - xen <not-affected> (Vulnerable code not present) [wheezy] - xen <not-affected> (Vulnerable code not present) NOTE: https://xenbits.xen.org/xsa/advisory-225.html -CVE-2017-10922 [XSA 224: bug 3] +CVE-2017-10922 (The grant-table feature in Xen through 4.8.x mishandles MMIO region ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-224.html -CVE-2017-10921 [XSA 224: bug 2] +CVE-2017-10921 (The grant-table feature in Xen through 4.8.x does not ensure sufficient ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-224.html -CVE-2017-10920 [XSA 224: bug 1] +CVE-2017-10920 (The grant-table feature in Xen through 4.8.x mishandles a ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-224.html -CVE-2017-10919 [XSA 223] +CVE-2017-10919 (Xen through 4.8.x mishandles virtual interrupt injection, which allows ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-223.html -CVE-2017-10918 [XSA 222] +CVE-2017-10918 (Xen through 4.8.x does not validate memory allocations during certain ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-222.html -CVE-2017-10917 [XSA 221] +CVE-2017-10917 (Xen through 4.8.x does not validate the port numbers of polled event ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-221.html -CVE-2017-10916 [XSA 220] +CVE-2017-10916 (The vCPU context-switch implementation in Xen through 4.8.x improperly ...) - xen <unfixed> [jessie] - xen <not-affected> (Vulnerable code not present) [wheezy] - xen <not-affected> (Vulnerable code not present) NOTE: https://xenbits.xen.org/xsa/advisory-220.html -CVE-2017-10915 [XSA 219] +CVE-2017-10915 (The shadow-paging feature in Xen through 4.8.x mismanages page ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-219.html -CVE-2017-10914 [XSA 218: bug 2] +CVE-2017-10914 (The grant-table feature in Xen through 4.8.x has a race condition ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-218.html -CVE-2017-10913 [XSA 218: bug 1] +CVE-2017-10913 (The grant-table feature in Xen through 4.8.x provides false mapping ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-218.html -CVE-2017-10912 [XSA 217] +CVE-2017-10912 (Xen through 4.8.x mishandles page transfer, which allows guest OS users ...) - xen <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-217.html -CVE-2017-10911 [XSA 216] +CVE-2017-10911 (The make_response function in drivers/block/xen-blkback/blkback.c in ...) - linux <unfixed> - qemu <unfixed> NOTE: https://xenbits.xen.org/xsa/advisory-216.html _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits