Salvatore Bonaccorso
2016-Dec-13 20:58 UTC
[Pkg-xen-devel] Bug#848081: xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override
Source: xen Version: 4.4.1-9 Severity: important Tags: security upstream patch Hi, the following vulnerability was published for xen. CVE-2016-9932[0]: x86 CMPXCHG8B emulation fails to ignore operand size override If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-9932 [1] https://xenbits.xen.org/xsa/advisory-200.html Regards, Salvatore
Debian Bug Tracking System
2016-Dec-21 15:21 UTC
[Pkg-xen-devel] Processed: XSA-200 is not in 4.8
Processing control commands:> fixed -1 4.8.0~rc3-0exp1Bug #848081 [src:xen] xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override Marked as fixed in versions xen/4.8.0~rc3-0exp1.> fixed -1 4.8.0~rc3-1Bug #848081 [src:xen] xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override Marked as fixed in versions xen/4.8.0~rc3-1.> fixed -1 4.8.0~rc5-1Bug #848081 [src:xen] xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override Marked as fixed in versions xen/4.8.0~rc5-1. -- 848081: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848081 Debian Bug Tracking System Contact owner at bugs.debian.org with problems
Debian Bug Tracking System
2017-May-27 12:36 UTC
[Pkg-xen-devel] Bug#848081: marked as done (xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override)
Your message dated Sat, 27 May 2017 12:34:02 +0000 with message-id <E1dEauw-000J3X-Hb at fasolo.debian.org> and subject line Bug#848081: fixed in xen 4.4.1-9+deb8u9 has caused the Debian Bug report #848081, regarding xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner at bugs.debian.org immediately.) -- 848081: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848081 Debian Bug Tracking System Contact owner at bugs.debian.org with problems -------------- next part -------------- An embedded message was scrubbed... From: Salvatore Bonaccorso <carnil at debian.org> Subject: xen: CVE-2016-9932: x86 CMPXCHG8B emulation fails to ignore operand size override Date: Tue, 13 Dec 2016 21:58:31 +0100 Size: 2118 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20170527/016b38b5/attachment.mht> -------------- next part -------------- An embedded message was scrubbed... From: Ian Jackson <ijackson at chiark.greenend.org.uk> Subject: Bug#848081: fixed in xen 4.4.1-9+deb8u9 Date: Sat, 27 May 2017 12:34:02 +0000 Size: 8203 URL: <http://lists.alioth.debian.org/pipermail/pkg-xen-devel/attachments/20170527/016b38b5/attachment-0001.mht>