similar to: Processed: fixed 447795 in 3.0.3-0-4

Displaying 20 results from an estimated 7000 matches similar to: "Processed: fixed 447795 in 3.0.3-0-4"

2007 Oct 23
0
Processed: found 447795 in 3.0.3-0-1
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > found 447795 3.0.3-0-1 Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss Bug marked as found in version 3.0.3-0-1. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking
2007 Oct 23
0
Processed: reassign 447795 to xen-3.0
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 447795 xen-3.0 3.0.3-0-3 Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss Bug reassigned from package `xen-utils-3.0.3-1' to `xen-3.0'. > End of message, stopping processing here. Please contact me if you
2007 Oct 23
0
Bug#447795: xen-utils-3.0.3-1: [CVE-2007-3919] xenmon.py / xenbaked insecure file accesss
Package: xen-utils-3.0.3-1 Version: 3.0.3-0-3 Severity: grave Tags: security Justification: user security hole Xen versions 3.x, and 3.1 contain a tool for processing Xen trace buffer information. This tool uses the static file /tmp/xenq-shm insecurely allowing a local user to truncate any local file when xenbaked or xenmon.py are invoked by root. Sample session: # setup. skx
2007 Oct 23
0
Processed: reassign 406863 to xen-common
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 406863 xen-common Bug#406863: xenmon.py isn't in the execution search path Bug reassigned from package `xen-utils-3.0.3-1' to `xen-common'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug
2005 Oct 20
0
XenMon Patch
Attached is the second release of XenMon, which is a unique performance monitoring tool for Xen. Instead of using hypervisor calls to get domain information, we use the xentrace facility to provide fine-grained monitoring of various metrics (see README below). We have written up a small case study that demonstrates the usefulness of the tool and the metrics that it reports. This will be
2006 Aug 14
0
[PATCH] remove another xc_dom0_op() user
# HG changeset patch # User john.levon@sun.com # Date 1155596263 -3600 # Node ID dc12f0942649ee27ff2aec3e3d9c2d99746b9e58 # Parent 09bc238664cb7b6d0f960f5e135ac80a75b342f1 Remove another external-to-libxc user of xc_dom0_op(). Signed-off-by: John Levon <john.levon@sun.com> diff -r 09bc238664cb -r dc12f0942649 tools/xenmon/xenbaked.c --- a/tools/xenmon/xenbaked.c Mon Aug 14 15:40:36 2006
2006 Jul 31
1
[PATCH 5/6] xen, tools: calculate nr_cpus via num_online_cpus
Once Xen calculates nr_nodes properly, all nr_cpu calculations based on nr_nodes * sockets_per_node * cores_per_socket * threads_per_core are broken. The easy fix is to replace those calculations with a new field, nr_cpus in physinfo which is calculated by num_online_cpus(). This patch does so and attempts to change all users over to nr_cpus field in physinfo. This patch touches
2007 Jan 14
1
Bug#406863: xenmon.py isn't in the execution search path
Package: xen-utils-3.0.3-1 Version: 3.0.3-0-2 For some reason, xenmon.py is not in the search path - maybe an issue of the wrapper used by the xen Debian packages seems to be only a link to the wrapper is missing the program exists in the package xen-utils-3.0.3-0-2 and the follwoing make it work: ln -s ../lib/xen-common/bin/xen-utils-wrapper /usr/sbin/xenmon.py ln -s
2008 Feb 04
1
Bug#464044: xen-unstable: CVE-2007-3919 prone to symlink attack
Source: xen-unstable Version: 3.0-unstable+hg11561-1 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-unstable. CVE-2007-3919[0]: | (1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local | users to truncate arbitrary files via a symlink attack on | /tmp/xenq-shm. If you fix this vulnerability please also include
2006 May 12
0
[PATCH]fix xentrace
Hi, All This is a patch for xentrace.c. This routine checks the trace buffer is initialized or not. If not, the trace buffer is initialized by using this patch. This is avoiding following message. ERROR: Failure to get trace buffer pointer from Xen (22 = Invalid argument) This routine is based on the specification of the trace buffer control function trace.c/tb_control(). The function checks
2006 May 24
0
[PATCH] Fix xc_tbuf_enable assumption.
Hi, All! This is a patch which needs discussion. Currently xc_tbuf_enable assumed tb_init_done = 0. But Sometimes already on For example(xenmon.py(xenbaked) and xentrace). These two programs assues tb_init_done =0 at start time. Currently xenbaked care the problem by setting tb_init_done=0 at exit time. But xentrace does not care the problem. Then error occured!(Cannot see the trace
2006 Mar 01
2
domU''s on SLES 10.0b3 crashing dom0
Hi all, I installed SLES 10.0b3 with XEN on some test-systems and created a SLES 10.0b3-image for use with domU''s. The installation and booting of this domU was no problem, but on some systems the host dom0 restarts if I generate some IP-traffic from the guest. This happens on an old AMD Athlon 1,3GHz, an old Intel P3 and an Intel desktop with P4 HT/VT/EM64T but not on an Intel
2008 Apr 04
0
Processed: fixed 469654 in 3.2.0-4
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.10.16 > fixed 469654 3.2.0-4 Bug#469654: xen-unstable: CVE-2008-0928 privilege escalation Bug marked as fixed in version 3.2.0-4. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator
2007 Jun 30
0
Processed: reassign 423006 to initramfs-tools, severity of 420754 is critical, merging 423006 420754
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 423006 initramfs-tools 0.87b Bug#423006: xen-hypervisor-3.0.3-1-i386-pae: /bin/sh : error while loading shared library libcrypt.so.1 Bug reassigned from package `xen-hypervisor-3.0.3-1-i386-pae' to `initramfs-tools'. > severity 420754 critical
2007 Sep 11
0
Processed: reassign 441249 to xen-3
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 441249 xen-3 3.0.3-0-2 Bug#441249: xen-hypervisor-3.0.3-1-i386-pae: "Problems using XEN when Quagga is running" Bug reassigned from package `xen-hypervisor-3.0.3-1-i386-pae' to `xen-3'. > End of message, stopping processing here. Please
2007 Oct 15
0
Processed: reassign 444430 to xen-3.0, cloning 444430, reassign -1 to xen-3, closing 444430
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.26 > reassign 444430 xen-3.0 3.0.3-0-2 Bug#444430: CVE-2007-4993 privilege escalation Bug reassigned from package `xen-3' to `xen-3.0'. > clone 444430 -1 Bug#444430: CVE-2007-4993 privilege escalation Bug 444430 cloned as bug 446771. > reassign -1 xen-3
2006 Sep 29
4
[PATCH 4/6] xen: export NUMA topology in physinfo hcall
This patch modifies the physinfo hcall to export NUMA CPU and Memory topology information. The new physinfo hcall is integrated into libxc and xend (xm info specifically). Included in this patch is a minor tweak to xm-test''s xm info testcase. The new fields in xm info are: nr_nodes : 4 mem_chunks : node0:0x0000000000000000-0x0000000190000000
2008 Apr 14
1
Processed: submitter 475553
Processing commands for control at bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.10.25 > submitter 475553 biebl at debian.org Bug#475553: Please add support for RFC 3339 high precision timestamps Changed Bug submitter from Francois Marier <francois at debian.org> to biebl at debian.org. > End of message, stopping processing here. Please contact
2006 Nov 01
0
Processed: reassign 394931 to xen-common
Processing commands for control@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.22 > reassign 394931 xen-common Bug#394931: xen-utils-3.0.3-1: Manpages not included Bug reassigned from package `xen-utils-3.0.3-1' to `xen-common'. > End of message, stopping processing here. Please contact me if you need assistance. Debian bug tracking system
2006 Nov 14
0
Processed: reassign 397758 to update-grub
Processing commands for control@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.22 > reassign 397758 update-grub Bug#397758: xen-utils-3.0.3-1: wrong grub menu entry generated if /boot is Warning: Unknown package 'update-grub' Bug reassigned from package `xen-utils-3.0.3-1' to `update-grub'. > End of message, stopping processing here.