similar to: Processed: severity of 770230 is important

Displaying 20 results from an estimated 20000 matches similar to: "Processed: severity of 770230 is important"

2014 Nov 21
0
Processed: retitle 770230 to xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Processing commands for control at bugs.debian.org: > retitle 770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Bug #770230 [src:xen] CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 Changed Bug title to 'xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030' from 'CVE-2014-5146 CVE-2014-5149 CVE-2014-8594
2015 Nov 05
0
Processed: closing 770230
Processing commands for control at bugs.debian.org: > close 770230 4.5.1~rc1-1 Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Marked as fixed in versions xen/4.5.1~rc1-1. Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Marked Bug as done > thanks Stopping processing here. Please contact me if
2014 Nov 21
0
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
On Wed, Nov 19, 2014 at 11:45:02PM +0100, Moritz Muehlenhoff wrote: > Source: xen > Severity: grave > Tags: security > > Hi, > the following security issues apply to Xen in jessie: > > CVE-2014-5146,CVE-2014-5149: > https://marc.info/?l=oss-security&m=140784877111813&w=2 > > CVE-2014-8594: >
2014 Nov 19
2
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
Source: xen Severity: grave Tags: security Hi, the following security issues apply to Xen in jessie: CVE-2014-5146,CVE-2014-5149: https://marc.info/?l=oss-security&m=140784877111813&w=2 CVE-2014-8594: https://marc.info/?l=oss-security&m=141631359901060&w=2 CVE-2014-8595: https://marc.info/?l=oss-security&m=141631352601020&w=2 Cheers, Moritz
2014 Nov 27
0
xen_4.4.1-4_amd64.changes ACCEPTED into unstable
Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 27 Nov 2014 20:17:36 +0100 Source: xen Binary: libxen-4.4 libxenstore3.0 libxen-dev xenstore-utils xen-utils-common xen-utils-4.4 xen-hypervisor-4.4-amd64 xen-system-amd64 xen-hypervisor-4.4-arm64 xen-system-arm64 xen-hypervisor-4.4-armhf xen-system-armhf Architecture: source all amd64 Version: 4.4.1-4 Distribution:
2015 Jan 07
0
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
The following packages are updated for Xen4CentOS for CentOS 6: Source: 942bc436e401c798991ae4ca956082c12a5a3b65ec53cd7ec9901dda7704f9b7 e1000e-2.5.4-3.10.63.2.el6.centos.alt.src.rpm aa46f97636568c46295d2d99f1e33b5fda50df707a2a8321a516200b8b4e95a6 kernel-3.10.63-11.el6.centos.alt.src.rpm ea44d2658e096ef6f00f7dfd4fecc6bff977d959563e4929539d23643b134c3a libvirt-0.10.2.8-9.el6.centos.alt.src.rpm
2015 Jan 27
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates. Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 21 Jan 2015 13:50:48 +0200 Source: xen Binary: xen-docs-4.1 libxen-4.1 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.1 xen-hypervisor-4.1-amd64 xen-system-amd64 xen-hypervisor-4.1-i386 xen-system-i386 Architecture:
2015 Jan 29
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Accepted: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 21 Jan 2015 13:50:48 +0200 Source: xen Binary: xen-docs-4.1 libxen-4.1 libxenstore3.0 libxen-dev xenstore-utils libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.1 xen-hypervisor-4.1-amd64 xen-system-amd64 xen-hypervisor-4.1-i386 xen-system-i386 Architecture: source all amd64 Version: 4.1.4-3+deb7u4
2012 May 06
0
Processed: severity of 671750 is important
Processing commands for control at bugs.debian.org: > severity 671750 important Bug #671750 [xen-utils-common] Configuration of domain save/restore broken Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 671750: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=671750 Debian Bug Tracking System Contact
2012 Jun 12
0
Processed: severity of 677244 is important
Processing commands for control at bugs.debian.org: > severity 677244 important Bug #677244 [xen-utils-common] xen-utils-common: xen-toolstack fails if either `xm` or `xl` is not found in xen-dir Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 677244:
2014 Aug 10
0
Processed: severity of 757724 is important
Processing commands for control at bugs.debian.org: > severity 757724 important Bug #757724 [src:xen] Multiple security issues Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 757724: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724 Debian Bug Tracking System Contact owner at bugs.debian.org
2015 Jan 08
0
CentOS-announce Digest, Vol 119, Issue 2
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2012 Aug 02
0
Processed: Set severity normal
Processing commands for control at bugs.debian.org: > severity 682979 normal Bug #682979 [xcp-xapi] xcp-xapi: VM not starting, tasks not cancellable Severity set to 'normal' from 'grave' > End of message, stopping processing here. Please contact me if you need assistance. -- 682979: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682979 Debian Bug Tracking System Contact
2012 Sep 26
0
Processed: severity of 674907 is normal
Processing commands for control at bugs.debian.org: > severity 674907 normal Bug #674907 [xen] shifts the clock by 50 minutes unexplicably under a Xen dom0 Severity set to 'normal' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 674907: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674907 Debian Bug Tracking System Contact
2007 Mar 08
0
Processed: severity of 414040 is important
Processing commands for control@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.27 > # does not make the package unusable > severity 414040 important Bug#414040: kernel: xen_net: Memory squeeze in netback driver. Severity set to `important' from `grave' > End of message, stopping processing here. Please contact me if you need assistance.
2014 Oct 01
0
CESA-2014:X010 Moderate xen Xen4CentOS Security Update
CentOS Errata and Security Advisory 2014:X010 (Xen4CentOS) The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) ----------------------------- X86_64 ----------------------------- f5a30e6c7c17a391dfc218cce2c2ca52dba4bf61d6c2d664faecda673d72fdea xen-4.2.5-33.el6.centos.alt.x86_64.rpm
2011 Jan 10
0
Processed: Security -ignores
Processing commands for control at bugs.debian.org: > # As per Moritz, not blockers > user release.debian.org at packages.debian.org Setting user to release.debian.org at packages.debian.org (was adam at adam-barratt.org.uk). > tag 609531 + squeeze-ignore Bug #609531 [xen] CVE-2010-4255: 64-bit PV xen guest can crash host by accessing hypervisor per-domain memory area Added tag(s)
2013 Oct 31
0
Processed: found 728266 in 2.0.91-2, tagging 728266, severity of 701278 is important, found 728158 in 0.9.0-2 ...
Processing commands for control at bugs.debian.org: > found 728266 2.0.91-2 Bug #728266 [blktap-dkms] Depends on obsolete packages Marked as found in versions blktap-dkms/2.0.91-2. > tags 728266 + jessie sid Bug #728266 [blktap-dkms] Depends on obsolete packages Added tag(s) sid and jessie. > severity 701278 important Bug #701278 [src:flush] flush: ftbfs with GCC-4.8 Severity set to
2015 Nov 05
0
Processed: closing 795721
Processing commands for control at bugs.debian.org: > close 795721 4.6.0-1 Bug #795721 [src:xen] CVE-2015-3259 CVE-2015-3340 CVE-2015-4163 CVE-2015-4164 Marked as fixed in versions xen/4.6.0-1. Bug #795721 [src:xen] CVE-2015-3259 CVE-2015-3340 CVE-2015-4163 CVE-2015-4164 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 795721:
2015 Mar 31
0
Processed: tagging 781620, found 781620 in 4.4.1-8
Processing commands for control at bugs.debian.org: > tags 781620 + upstream fixed-upstream Bug #781620 [src:xen] CVE-2015-2751 CVE-2015-2752 CVE-2015-2756 Added tag(s) upstream and fixed-upstream. > found 781620 4.4.1-8 Bug #781620 [src:xen] CVE-2015-2751 CVE-2015-2752 CVE-2015-2756 Marked as found in versions xen/4.4.1-8. > thanks Stopping processing here. Please contact me if you