Bug#913137: marked as done (virtualbox: VirtualBox E1000 Guest-to-Host Escape)

2018-11-10 Thread Debian Bug Tracking System
Your message dated Sat, 10 Nov 2018 21:42:07 + (UTC)
with message-id <715204243.487615.1541886127...@mail.yahoo.com>
and subject line Re: Bug#913137: closed by Gianfranco Costamagna 
 (Bug#913137: fixed in virtualbox 5.2.22-dfsg-1)
has caused the Debian Bug report #913137,
regarding virtualbox: VirtualBox E1000 Guest-to-Host Escape
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913137: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913137
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: virtualbox
Version: 5.2.20-dfsg-3
Severity: grave
Tags: security upstream
Justification: user security hole

Hi

See https://github.com/MorteNoir1/virtualbox_e1000_0day for the
respective report.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
 https://github.com/MorteNoir1/virtualbox_e1000_0day/issues/12fixed according 
to the first reporter.
G.

Il venerdì 9 novembre 2018, 22:54:08 CET, Salvatore Bonaccorso 
 ha scritto:  
 
 Hi Gianfranco

Let's keep this open until it is confirmed that the changes 5.2.20 ->
5.2.22 are actually enough.

Did you got any confirmation on your query to upstream?

Regards,
Salvatore

  --- End Message ---


Bug#913137: marked as done (virtualbox: VirtualBox E1000 Guest-to-Host Escape)

2018-11-09 Thread Debian Bug Tracking System
Your message dated Fri, 09 Nov 2018 11:35:09 +
with message-id 
and subject line Bug#913137: fixed in virtualbox 5.2.22-dfsg-1
has caused the Debian Bug report #913137,
regarding virtualbox: VirtualBox E1000 Guest-to-Host Escape
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913137: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913137
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: virtualbox
Version: 5.2.20-dfsg-3
Severity: grave
Tags: security upstream
Justification: user security hole

Hi

See https://github.com/MorteNoir1/virtualbox_e1000_0day for the
respective report.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: virtualbox
Source-Version: 5.2.22-dfsg-1

We believe that the bug you reported is fixed in the latest version of
virtualbox, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 913...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gianfranco Costamagna  (supplier of updated 
virtualbox package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 09 Nov 2018 12:12:06 +0100
Source: virtualbox
Binary: virtualbox-qt virtualbox virtualbox-dkms virtualbox-source 
virtualbox-guest-dkms virtualbox-guest-source virtualbox-guest-x11 
virtualbox-guest-utils
Architecture: source
Version: 5.2.22-dfsg-1
Distribution: unstable
Urgency: high
Maintainer: Debian Virtualbox Team 
Changed-By: Gianfranco Costamagna 
Description:
 virtualbox - x86 virtualization solution - base binaries
 virtualbox-dkms - x86 virtualization solution - kernel module sources for dkms
 virtualbox-guest-dkms - x86 virtualization solution - guest addition module 
source for dk
 virtualbox-guest-source - x86 virtualization solution - guest addition module 
source
 virtualbox-guest-utils - x86 virtualization solution - non-X11 guest utilities
 virtualbox-guest-x11 - x86 virtualization solution - X11 guest utilities
 virtualbox-qt - x86 virtualization solution - Qt based user interface
 virtualbox-source - x86 virtualization solution - kernel module source
Closes: 913137
Changes:
 virtualbox (5.2.22-dfsg-1) unstable; urgency=high
 .
   * New upstream release (Closes: #913137)
   * Drop gcc patch
   * patch refresh
Checksums-Sha1:
 0d0e9e947115f6b0e18e532e8af22aa616a6a776 3648 virtualbox_5.2.22-dfsg-1.dsc
 b3202b3d59adb8fa1d6b9190ea49e84a07466817 55028848 
virtualbox_5.2.22-dfsg.orig.tar.xz
 e364a15eb76e3befbad8fdde3fa22c1106cb02d9 84812 
virtualbox_5.2.22-dfsg-1.debian.tar.xz
 ab30afaaa1f03e36c6939060028505303f762f0b 21930 
virtualbox_5.2.22-dfsg-1_source.buildinfo
Checksums-Sha256:
 04377e8433e9f2fba8c7912253ad7f38a7351fcf4de6f7d7dfd59f67f513517d 3648 
virtualbox_5.2.22-dfsg-1.dsc
 a1732316b2cac1afea2409f936f49322aa2e7b0757d22c58795069fb219a08dc 55028848 
virtualbox_5.2.22-dfsg.orig.tar.xz
 f50d71c63efaddca7ecdb4c35bf7f2c787a8795e6162d1d1ba1cd0695c39e045 84812 
virtualbox_5.2.22-dfsg-1.debian.tar.xz
 f75caf489487cfaa4037da3afa202c399be7c7912904171bfc00ee3537981c1a 21930 
virtualbox_5.2.22-dfsg-1_source.buildinfo
Files:
 83b888a2a405e78cd14529167f84c766 3648 contrib/misc optional 
virtualbox_5.2.22-dfsg-1.dsc
 b9ebccbf532b71545026327b9de42e44 55028848 contrib/misc optional 
virtualbox_5.2.22-dfsg.orig.tar.xz
 28f86b8ccea0ced10d0e26750ed1f506 84812 contrib/misc optional 
virtualbox_5.2.22-dfsg-1.debian.tar.xz
 e5e830de204e6b452a571cfe00d191ec 21930 contrib/misc optional 
virtualbox_5.2.22-dfsg-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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