DDPOMail robot
2008-Mar-03 09:13 UTC
[Pkg-xen-devel] Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-3: = This package has 1 bug(s) that should be fixed for the next Debian release: - #464969 <http://bugs.debian.org/464969> xen-hypervisor-3.2-1-i386: Linux mmap()/vmsplice() exploit causes memory map corruption in hypervisor regardless of domain privilege This is a Release-Critical bug! This is an automated mail. These mails are sent monthly. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail We are sorry if this mail was useless for you. If you think it was avoidable (that we can detect easily that the problems weren't actually problems), please reply to it and let us know. If you don't want to receive this type of mail any more, you can reply to this mail and use one of the following commands at the beginning of the mail: - unsubscribe <email> You will no longer receive any mail for any package - ignore <package> <email> You will no longer receive information about that package in those mails. So if that package is the only one with problems, you won't receive anything. - ignore <bug> <email> You will no longer receive information about this bug. All commands are manually processed, but you will receive confirmation. The commands are just here so that we know precisely what you want. A more detailed status of your packages is available from the DDPO. See: http://qa.debian.org/developer.php?login=pkg-xen-devel at lists.alioth.debian.org Don't hesitate to reply to this mail if you have questions. The wiki page will be updated with useful information. -- DDPOMail, run by Lucas Nussbaum
DDPOMail robot
2008-Apr-01 08:20 UTC
[Pkg-xen-devel] Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-3: = This package has 1 bug(s) that should be fixed for the next Debian release: - #469662 <http://bugs.debian.org/469662> xen-3: CVE-2008-0928 privilege escalation This is a Release-Critical bug! This is an automated mail. These mails are sent monthly. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail We are sorry if this mail was useless for you. If you think it was avoidable (that we can detect easily that the problems weren't actually problems), please reply to it and let us know. If you don't want to receive this type of mail any more, you can reply to this mail and use one of the following commands at the beginning of the mail: - unsubscribe <email> You will no longer receive any mail for any package - ignore <package> <email> You will no longer receive information about that package in those mails. So if that package is the only one with problems, you won't receive anything. - ignore <bug> <email> You will no longer receive information about this bug. All commands are manually processed, but you will receive confirmation. The commands are just here so that we know precisely what you want. A more detailed status of your packages is available from the DDPO. See: http://qa.debian.org/developer.php?login=pkg-xen-devel at lists.alioth.debian.org Don't hesitate to reply to this mail if you have questions. The wiki page will be updated with useful information. -- DDPOMail, run by Lucas Nussbaum