Your message dated Fri, 07 Mar 2008 13:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#469654: fixed in xen-3 3.2.0-4
has caused the Debian Bug report #469654,
regarding xen-unstable: CVE-2008-0928 privilege escalation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
469654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469654
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: xen-unstable
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-unstable.

CVE-2008-0928[0]:
| Qemu 0.9.1 and earlier does not perform range checks for block device
| read or write requests, which allows guest host users with root
| privileges to access arbitrary memory and escape the virtual machine.

If you fix this vulnerability please also include the CVE id
in your changelog entry.

https://bugzilla.redhat.com/attachment.cgi?id=296005 is the 
patch (tools/ioemu/block.c should get patched).

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpdv2zb2RTGx.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: xen-3
Source-Version: 3.2.0-4

We believe that the bug you reported is fixed in the latest version of
xen-3, which is due to be installed in the Debian FTP archive:

libxen-dev_3.2.0-4_amd64.deb
  to pool/main/x/xen-3/libxen-dev_3.2.0-4_amd64.deb
libxenstore3.0_3.2.0-4_amd64.deb
  to pool/main/x/xen-3/libxenstore3.0_3.2.0-4_amd64.deb
xen-3_3.2.0-4.diff.gz
  to pool/main/x/xen-3/xen-3_3.2.0-4.diff.gz
xen-3_3.2.0-4.dsc
  to pool/main/x/xen-3/xen-3_3.2.0-4.dsc
xen-docs-3.2_3.2.0-4_all.deb
  to pool/main/x/xen-3/xen-docs-3.2_3.2.0-4_all.deb
xen-hypervisor-3.2-1-amd64_3.2.0-4_amd64.deb
  to pool/main/x/xen-3/xen-hypervisor-3.2-1-amd64_3.2.0-4_amd64.deb
xen-utils-3.2-1_3.2.0-4_amd64.deb
  to pool/main/x/xen-3/xen-utils-3.2-1_3.2.0-4_amd64.deb
xenstore-utils_3.2.0-4_amd64.deb
  to pool/main/x/xen-3/xenstore-utils_3.2.0-4_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank <[EMAIL PROTECTED]> (supplier of updated xen-3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 07 Mar 2008 14:21:38 +0100
Source: xen-3
Binary: xen-docs-3.2 libxenstore3.0 libxen-dev xenstore-utils xen-utils-3.2-1 
xen-hypervisor-3.2-1-amd64 xen-hypervisor-3.2-1-i386 
xen-hypervisor-3.2-1-i386-nonpae
Architecture: source all amd64
Version: 3.2.0-4
Distribution: unstable
Urgency: low
Maintainer: Debian Xen Team <[EMAIL PROTECTED]>
Changed-By: Bastian Blank <[EMAIL PROTECTED]>
Description: 
 libxen-dev - Public headers and libs for Xen
 libxenstore3.0 - Xenstore communications library for Xen
 xen-docs-3.2 - Documentation for Xen
 xen-hypervisor-3.2-1-amd64 - The Xen Hypervisor on AMD64
 xen-utils-3.2-1 - XEN administrative tools
 xenstore-utils - Xenstore utilities for Xen
Closes: 469654
Changes: 
 xen-3 (3.2.0-4) unstable; urgency=low
 .
   * Pull in newer xen-utils-common.
   * Fix missing size checks in the ioemu block driver. (closes: #469654)
     See: CVE-2008-0928
Files: 
 4620e5519fdda1e716ec0495437613f6 1198 misc extra xen-3_3.2.0-4.dsc
 15d64e7ba8b5cefdc79155cc1b29ab11 28781 misc extra xen-3_3.2.0-4.diff.gz
 8b5ddfe1a2f6b4d2bdf824b04a101ccb 1198284 doc extra xen-docs-3.2_3.2.0-4_all.deb
 1392f1c22f0678b2395c42aad7ffa1e3 408252 misc extra 
xen-hypervisor-3.2-1-amd64_3.2.0-4_amd64.deb
 99461fa857b19132c638096f20cae7b2 195018 libdevel extra 
libxen-dev_3.2.0-4_amd64.deb
 67741bfe3f5bac3e61c8efb7753f5a4f 18912 libs extra 
libxenstore3.0_3.2.0-4_amd64.deb
 0d58fa3eb963eaed0e9abab4219261ac 1105270 misc extra 
xen-utils-3.2-1_3.2.0-4_amd64.deb
 de7af8ba7496db54294ae0955d1b1496 22368 admin extra 
xenstore-utils_3.2.0-4_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iEYEARECAAYFAkfRQ2wACgkQxWtQqFixGB5NUQCeIr4aqX+527VMFECYIz6Z3oGF
rA0An0OjcowgsiBwBaQKbnyB1HUW8WoX
=oSRU
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to