Skip to content
GitLab
Explore
Sign in
Register
Commits on Source (5)
CVE-2018-19963/xen assigned for XSA-276
· c46e9882
Salvatore Bonaccorso
authored
Dec 08, 2018
c46e9882
CVE-2018-19964/xen assigned for XSA-277
· 23168825
Salvatore Bonaccorso
authored
Dec 08, 2018
23168825
CVE-2018-19965/xen assigned for XSA-279
· 5a92b478
Salvatore Bonaccorso
authored
Dec 08, 2018
5a92b478
CVE-2018-19966/xen assigned for XSA-280
· d3609170
Salvatore Bonaccorso
authored
Dec 08, 2018
d3609170
CVE-2018-19967/xen assigned for XSA-282
· e3734d29
Salvatore Bonaccorso
authored
Dec 08, 2018
e3734d29
Show whitespace changes
Inline
Side-by-side
data/CVE/list
View file @
e3734d29
...
@@ -4969,18 +4969,18 @@ CVE-2018-19368
...
@@ -4969,18 +4969,18 @@ CVE-2018-19368
RESERVED
RESERVED
CVE-2018-19367 (Portainer through 1.19.2 provides an API endpoint ...)
CVE-2018-19367 (Portainer through 1.19.2 provides an API endpoint ...)
NOT-FOR-US: Portainer
NOT-FOR-US: Portainer
CVE-2018-
XXXX
[XSA-280: Fix for XSA-240 conflicts with shadow paging]
CVE-2018-
19966
[XSA-280: Fix for XSA-240 conflicts with shadow paging]
- xen <unfixed>
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-280.txt
NOTE: https://xenbits.xen.org/xsa/advisory-280.txt
CVE-2018-
XXXX
[XSA-279: x86: DoS from attempting to use INVPCID with a non-canonical addresses]
CVE-2018-
19965
[XSA-279: x86: DoS from attempting to use INVPCID with a non-canonical addresses]
- xen <unfixed>
- xen <unfixed>
NOTE: https://xenbits.xen.org/xsa/advisory-279.txt
NOTE: https://xenbits.xen.org/xsa/advisory-279.txt
CVE-2018-
XXXX
[XSA-277: x86: incorrect error handling for guest p2m page removals]
CVE-2018-
19964
[XSA-277: x86: incorrect error handling for guest p2m page removals]
- xen <unfixed>
- xen <unfixed>
[stretch] - xen <not-affected> (Only affects 4.11)
[stretch] - xen <not-affected> (Only affects 4.11)
[jessie] - xen <not-affected> (Only affects 4.11)
[jessie] - xen <not-affected> (Only affects 4.11)
NOTE: https://xenbits.xen.org/xsa/advisory-277.txt
NOTE: https://xenbits.xen.org/xsa/advisory-277.txt
CVE-2018-
XXXX
[XSA-276: resource accounting issues in x86 IOREQ server handling]
CVE-2018-
19963
[XSA-276: resource accounting issues in x86 IOREQ server handling]
- xen <unfixed>
- xen <unfixed>
[stretch] - xen <not-affected> (Only affects 4.11)
[stretch] - xen <not-affected> (Only affects 4.11)
[jessie] - xen <not-affected> (Only affects 4.11)
[jessie] - xen <not-affected> (Only affects 4.11)
...
@@ -5896,10 +5896,9 @@ CVE-2018-19117
...
@@ -5896,10 +5896,9 @@ CVE-2018-19117
RESERVED
RESERVED
CVE-2018-19116
CVE-2018-19116
RESERVED
RESERVED
CVE-2018-
XXXX
[XSA-282: guest use of HLE constructs may lock up host]
CVE-2018-
19967
[XSA-282: guest use of HLE constructs may lock up host]
- xen <unfixed>
- xen <unfixed>
[stretch] - xen <postponed> (Hold back until next DSA)
[stretch] - xen <postponed> (Hold back until next DSA)
[jessie] - xen 4.4.4lts4-0+deb8u1
NOTE: https://xenbits.xen.org/xsa/advisory-282.txt
NOTE: https://xenbits.xen.org/xsa/advisory-282.txt
CVE-2018-19115 (keepalived before 2.0.7 has a heap-based buffer overflow when parsing ...)
CVE-2018-19115 (keepalived before 2.0.7 has a heap-based buffer overflow when parsing ...)
{DLA-1589-1}
{DLA-1589-1}
data/DLA/list
View file @
e3734d29
...
@@ -79,7 +79,7 @@
...
@@ -79,7 +79,7 @@
{CVE-2016-1238 CVE-2017-15705 CVE-2018-11780 CVE-2018-11781}
{CVE-2016-1238 CVE-2017-15705 CVE-2018-11780 CVE-2018-11781}
[jessie] - spamassassin 3.4.2-0+deb8u1
[jessie] - spamassassin 3.4.2-0+deb8u1
[12 Nov 2018] DLA-1577-1 xen - security update
[12 Nov 2018] DLA-1577-1 xen - security update
{CVE-2018-7540 CVE-2018-7541 CVE-2018-8897 CVE-2018-12891 CVE-2018-12893 CVE-2018-15469 CVE-2018-15470}
{CVE-2018-7540 CVE-2018-7541 CVE-2018-8897 CVE-2018-12891 CVE-2018-12893 CVE-2018-15469 CVE-2018-15470
CVE-2018-19967
}
[jessie] - xen 4.4.4lts4-0+deb8u1
[jessie] - xen 4.4.4lts4-0+deb8u1
[12 Nov 2018] DLA-1576-1 ansible - security update
[12 Nov 2018] DLA-1576-1 ansible - security update
{CVE-2018-16837}
{CVE-2018-16837}
...
...