Your message dated Fri, 4 Jul 2008 20:11:41 +0200
with message-id <[EMAIL PROTECTED]>
and subject line fixed
has caused the Debian Bug report #464044,
regarding xen-unstable: CVE-2007-3919 prone to symlink attack
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
464044: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464044
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Source: xen-unstable
Version: 3.0-unstable+hg11561-1
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-unstable.
CVE-2007-3919[0]:
| (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local
| users to truncate arbitrary files via a symlink attack on
| /tmp/xenq-shm.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3919
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgpRMZrhsCTUg.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Version: 3.3-unstable+hg17192-1
Fixed.
Bastian
--
"Beauty is transitory."
"Beauty survives."
-- Spock and Kirk, "That Which Survives", stardate unknown
--- End Message ---