Your message dated Sat, 20 Oct 2007 09:32:11 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#444430: fixed in xen-3 3.1.1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: xen-3.0
Version: 3.0.3-0-2
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.0.

CVE-2007-4993[0]:
| pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest
| domain, allows local users with elevated privileges in the guest domain to
| execute arbitrary commands in domain 0 via a crafted grub.conf file whose
| contents are used in exec statements. 

If you fix this vulnerability please also include the CVE id
in your changelog entry.

For further information:
[0] http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4993

Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpVGh1HZBSZA.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: xen-3
Source-Version: 3.1.1-1

We believe that the bug you reported is fixed in the latest version of
xen-3, which is due to be installed in the Debian FTP archive:

xen-3_3.1.1-1.dsc
  to pool/main/x/xen-3/xen-3_3.1.1-1.dsc
xen-3_3.1.1-1.tar.gz
  to pool/main/x/xen-3/xen-3_3.1.1-1.tar.gz
xen-docs-3.1_3.1.1-1_all.deb
  to pool/main/x/xen-3/xen-docs-3.1_3.1.1-1_all.deb
xen-hypervisor-3.1-1-amd64_3.1.1-1_amd64.deb
  to pool/main/x/xen-3/xen-hypervisor-3.1-1-amd64_3.1.1-1_amd64.deb
xen-utils-3.1-1_3.1.1-1_amd64.deb
  to pool/main/x/xen-3/xen-utils-3.1-1_3.1.1-1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank <[EMAIL PROTECTED]> (supplier of updated xen-3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 19 Oct 2007 16:02:37 +0000
Source: xen-3
Binary: xen-utils-3.1-1 xen-docs-3.1 xen-hypervisor-3.1-1-i386-nonpae 
xen-hypervisor-3.1-1-amd64 xen-hypervisor-3.1-1-i386
Architecture: source amd64 all
Version: 3.1.1-1
Distribution: unstable
Urgency: low
Maintainer: Debian Xen Team <[EMAIL PROTECTED]>
Changed-By: Bastian Blank <[EMAIL PROTECTED]>
Description: 
 xen-docs-3.1 - documentation for XEN, a Virtual Machine Monitor
 xen-hypervisor-3.1-1-amd64 - The Xen Hypervisor on AMD64
 xen-utils-3.1-1 - XEN administrative tools
Closes: 444430
Changes: 
 xen-3 (3.1.1-1) unstable; urgency=low
 .
   * New upstream release:
     - Don't use exec with untrusted values in pygrub. (closes: #444430)
       See CVE-2007-4993.
Files: 
 c1199cc8aef40a49783c2ee64d52762c 1089 misc extra xen-3_3.1.1-1.dsc
 702fc8cfb6c7364e688281adf5030e9e 7711618 misc extra xen-3_3.1.1-1.tar.gz
 041261398d5f36d68a13040526123603 1099324 misc extra 
xen-docs-3.1_3.1.1-1_all.deb
 7b757ecc3f52da95851397afe187b411 1126574 misc extra 
xen-utils-3.1-1_3.1.1-1_amd64.deb
 d389a2afa116ea99f19f441fe949162a 360808 misc extra 
xen-hypervisor-3.1-1-amd64_3.1.1-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iEYEARECAAYFAkcZuvsACgkQLkAIIn9ODhFougCfZvP/glET5XryC52nHqcb/iVW
4GoAn25SxCauDS3rJrHUR40/KGAglN2D
=bVUF
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to