Your message dated Mon, 7 Mar 2016 22:08:47 +0100
with message-id <[email protected]>
and subject line Re: Bug#797110: criu: CVE-2015-5231: service daemon allows to
bypass ptrace policy
has caused the Debian Bug report #797110,
regarding criu: CVE-2015-5231: service daemon allows to bypass ptrace policy
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
797110: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797110
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: criu
Version: 1.3.1-1
Severity: normal
Tags: security upstream
the following vulnerability was published for criu.
CVE-2015-5231[0]:
service daemon allows to bypass ptrace policy
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2015-5231
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1256728
--- End Message ---
--- Begin Message ---
Source: criu
Source-Version: 1.8-1
http://criu.org/Download/criu#v._1.8
--- End Message ---