Debian Bug report logs - #686966
unblock: xen/4.1.3-2

Package: release.debian.org; Maintainer for release.debian.org is Debian Release Team <debian-release@lists.debian.org>;

Reported by: Bastian Blank <waldi@debian.org>

Date: Fri, 7 Sep 2012 19:15:01 UTC

Severity: normal

Done: "Adam D. Barratt" <adam@adam-barratt.org.uk>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Release Team <debian-release@lists.debian.org>:
Bug#686966; Package release.debian.org. (Fri, 07 Sep 2012 19:15:04 GMT) Full text and rfc822 format available.

Acknowledgement sent to Bastian Blank <waldi@debian.org>:
New Bug report received and forwarded. Copy sent to Debian Release Team <debian-release@lists.debian.org>. (Fri, 07 Sep 2012 19:15:04 GMT) Full text and rfc822 format available.

Message #5 received at submit@bugs.debian.org (full text, mbox):

From: Bastian Blank <waldi@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: unblock: xen/4.1.3-2
Date: Fri, 07 Sep 2012 21:10:29 +0200
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock xen/4.1.3-2. It includes only security fixes.

xen (4.1.3-2) unstable; urgency=medium

  * Don't allow writing reserved bits in debug register.
    CVE-2012-3494
  * Fix error handling in interrupt assignment.
    CVE-2012-3495
  * Don't trigger bug messages on invalid flags.
    CVE-2012-3496
  * Check array bounds in interrupt assignment.
    CVE-2012-3498
  * Properly check bounds while setting the cursor in qemu.
    CVE-2012-3515
  * Disable monitor in qemu by default.
    CVE-2012-4411

unblock xen/4.1.3-2

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.5-trunk-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



Reply sent to "Adam D. Barratt" <adam@adam-barratt.org.uk>:
You have taken responsibility. (Sat, 08 Sep 2012 13:09:06 GMT) Full text and rfc822 format available.

Notification sent to Bastian Blank <waldi@debian.org>:
Bug acknowledged by developer. (Sat, 08 Sep 2012 13:09:06 GMT) Full text and rfc822 format available.

Message #10 received at 686966-done@bugs.debian.org (full text, mbox):

From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
To: Bastian Blank <waldi@debian.org>, 686966-done@bugs.debian.org
Subject: Re: Bug#686966: unblock: xen/4.1.3-2
Date: Sat, 08 Sep 2012 14:05:21 +0100
On Fri, 2012-09-07 at 21:10 +0200, Bastian Blank wrote:
> xen (4.1.3-2) unstable; urgency=medium
> 
>   * Don't allow writing reserved bits in debug register.
>     CVE-2012-3494
>   * Fix error handling in interrupt assignment.
>     CVE-2012-3495
>   * Don't trigger bug messages on invalid flags.
>     CVE-2012-3496
>   * Check array bounds in interrupt assignment.
>     CVE-2012-3498
>   * Properly check bounds while setting the cursor in qemu.
>     CVE-2012-3515
>   * Disable monitor in qemu by default.
>     CVE-2012-4411

Unblocked; thanks.

Regards,

Adam




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 07 Oct 2012 07:27:03 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Apr 18 21:55:16 2014; Machine Name: buxtehude.debian.org

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.