Author: jmm
Date: 2016-11-08 11:40:58 +0000 (Tue, 08 Nov 2016)
New Revision: 46060

Modified:
   data/CVE/list
Log:
initial set of xen fixed in sid
sudo no-dsa


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-11-08 10:33:41 UTC (rev 46059)
+++ data/CVE/list       2016-11-08 11:40:58 UTC (rev 46060)
@@ -4624,7 +4624,7 @@
        RESERVED
 CVE-2016-7777 (Xen 4.7.x and earlier does not properly honor CR0.TS and 
CR0.EM, which ...)
        {DLA-699-1}
-       - xen <unfixed>
+       - xen 4.8.0~rc3-1
        NOTE: http://xenbits.xen.org/xsa/advisory-190.html
 CVE-2016-7776
        RESERVED
@@ -6462,7 +6462,7 @@
        NOTE: http://xenbits.xen.org/xsa/advisory-186.html
 CVE-2016-7092 (The get_page_from_l3e function in arch/x86/mm.c in Xen allows 
local ...)
        {DSA-3663-1 DLA-614-1}
-       - xen <unfixed>
+       - xen 4.8.0~rc3-1
        NOTE: http://xenbits.xen.org/xsa/advisory-185.html
 CVE-2016-7090 (The integrated web server on Siemens SCALANCE M-800 and S615 
modules ...)
        NOT-FOR-US: Siemens
@@ -6520,6 +6520,7 @@
 CVE-2016-7076 [noexec bypass via wordexp()]
        RESERVED
        - sudo <unfixed> (bug #842507)
+       [jessie] - sudo <no-dsa> (Minor issue)
        NOTE: https://www.sudo.ws/alerts/noexec_wordexp.html
        NOTE: https://www.sudo.ws/repos/sudo/rev/e7d09243e51b
        NOTE: https://www.sudo.ws/repos/sudo/rev/7b8357b0a358
@@ -6648,6 +6649,7 @@
 CVE-2016-7032 [noexec bypass via system() and popen()]
        RESERVED
        - sudo 1.8.15-1
+       [jessie] - sudo <no-dsa> (Minor issue)
        NOTE: https://www.sudo.ws/alerts/noexec_bypass.html
        NOTE: This CVE is for the bypass via system() and popen(). The 
wordpexp() bypass
        NOTE: is tracked under CVE-2016-7076.
@@ -9163,7 +9165,7 @@
 CVE-2016-6260
        RESERVED
 CVE-2016-6259 (Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access 
...)
-       - xen <unfixed>
+       - xen 4.8.0~rc3-1
        [jessie] - xen <not-affected> (Only affects 4.5 and later)
        [wheezy] - xen <not-affected> (Only affects 4.5 and later)
        NOTE: http://xenbits.xen.org/xsa/advisory-183.html


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to