Your message dated Tue, 23 Jan 2007 21:17:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#407350: fixed in kernel-patch-grsecurity2 2.1.10-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-patch-grsecurity2
Version: 2.1.5-1
Severity: important
Tags: security

A vulnerability has been reported in grsecurity, which can be exploited by 
malicious, 
local users to gain escalated privileges.
The vulnerability is caused due to an unspecified error within the 
"expand_stack()" 
function, which may allow execution of arbitrary code with root privileges.

Reference:
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0257
http://www.securityfocus.com/bid/22014

Note:
Please mention the CVE id in the changelog.


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)


regards,
-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


--- End Message ---
--- Begin Message ---
Source: kernel-patch-grsecurity2
Source-Version: 2.1.10-1

We believe that the bug you reported is fixed in the latest version of
kernel-patch-grsecurity2, which is due to be installed in the Debian FTP 
archive:

kernel-patch-grsecurity2_2.1.10-1.diff.gz
  to 
pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.10-1.diff.gz
kernel-patch-grsecurity2_2.1.10-1.dsc
  to pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.10-1.dsc
kernel-patch-grsecurity2_2.1.10-1_all.deb
  to 
pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.10-1_all.deb
kernel-patch-grsecurity2_2.1.10.orig.tar.gz
  to 
pool/main/k/kernel-patch-grsecurity2/kernel-patch-grsecurity2_2.1.10.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Laszlo Boszormenyi (GCS) <[EMAIL PROTECTED]> (supplier of updated 
kernel-patch-grsecurity2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 23 Jan 2007 20:44:27 +0000
Source: kernel-patch-grsecurity2
Binary: kernel-patch-grsecurity2
Architecture: source all
Version: 2.1.10-1
Distribution: unstable
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <[EMAIL PROTECTED]>
Changed-By: Laszlo Boszormenyi (GCS) <[EMAIL PROTECTED]>
Description: 
 kernel-patch-grsecurity2 - grsecurity kernel patch - new major upstream version
Closes: 396082 407350
Changes: 
 kernel-patch-grsecurity2 (2.1.10-1) unstable; urgency=high
 .
   * New upstream release, fixing CVE-2007-0257 (closes: #407350).
   * Add German debconf translations, thanks to Helge Kreutzmann
     (closes: #396082).
Files: 
 b820b69f236fea5c4ddc4f55cc30b7e5 673 devel extra 
kernel-patch-grsecurity2_2.1.10-1.dsc
 fd0d898bdc3877ab00b995a3ec7dbfbc 500300 devel extra 
kernel-patch-grsecurity2_2.1.10.orig.tar.gz
 f8b6fb22a9323ac5f06727570a13bdf3 15838 devel extra 
kernel-patch-grsecurity2_2.1.10-1.diff.gz
 6c4bf6b8f97341bb58c0d93dcc7c5b8f 522356 devel extra 
kernel-patch-grsecurity2_2.1.10-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFtnd/MDatjqUaT90RAiX+AJ9z9Frc8l+C5lXZYCWkUJUccS4e2ACfR8MV
FG7fcIbkTnj7lIpUc2jvG38=
=bh11
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to