Your message dated Sat, 10 Nov 2018 21:42:07 +0000 (UTC)
with message-id <715204243.487615.1541886127...@mail.yahoo.com>
and subject line Re: Bug#913137: closed by Gianfranco Costamagna 
<locutusofb...@debian.org> (Bug#913137: fixed in virtualbox 5.2.22-dfsg-1)
has caused the Debian Bug report #913137,
regarding virtualbox: VirtualBox E1000 Guest-to-Host Escape
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913137: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913137
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: virtualbox
Version: 5.2.20-dfsg-3
Severity: grave
Tags: security upstream
Justification: user security hole

Hi

See https://github.com/MorteNoir1/virtualbox_e1000_0day for the
respective report.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
 https://github.com/MorteNoir1/virtualbox_e1000_0day/issues/12fixed according 
to the first reporter.
G.

    Il venerdì 9 novembre 2018, 22:54:08 CET, Salvatore Bonaccorso 
<car...@debian.org> ha scritto:  
 
 Hi Gianfranco

Let's keep this open until it is confirmed that the changes 5.2.20 ->
5.2.22 are actually enough.

Did you got any confirmation on your query to upstream?

Regards,
Salvatore

  

--- End Message ---

Reply via email to