Your message dated Sat, 12 Apr 2008 17:54:46 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#457445: fixed in libnet-dns-perl 0.48-1sarge1 has caused the Debian Bug report #457445, regarding libnet-dns-perl: CVE-2007-6341 possible remote denial of service vulnerability to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 457445: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457445 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: libnet-dns-perl Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for libnet-dns-perl. CVE-2007-6341[0]: | Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such | as SpamAssassin and OTRS, allows remote attackers to cause a denial of | service (program "croak") via a crafted DNS response. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6341 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.pgpwbVXiHEpt5.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: libnet-dns-perl Source-Version: 0.48-1sarge1 We believe that the bug you reported is fixed in the latest version of libnet-dns-perl, which is due to be installed in the Debian FTP archive: libnet-dns-perl_0.48-1sarge1.diff.gz to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1.diff.gz libnet-dns-perl_0.48-1sarge1.dsc to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1.dsc libnet-dns-perl_0.48-1sarge1_i386.deb to pool/main/libn/libnet-dns-perl/libnet-dns-perl_0.48-1sarge1_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Florian Weimer <[EMAIL PROTECTED]> (supplier of updated libnet-dns-perl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Fri, 07 Mar 2008 23:03:36 +0100 Source: libnet-dns-perl Binary: libnet-dns-perl Architecture: source i386 Version: 0.48-1sarge1 Distribution: oldstable-security Urgency: high Maintainer: Florian Hinzmann <[EMAIL PROTECTED]> Changed-By: Florian Weimer <[EMAIL PROTECTED]> Description: libnet-dns-perl - Perform DNS queries from a Perl script Closes: 457445 Changes: libnet-dns-perl (0.48-1sarge1) oldstable-security; urgency=high . * Malformed A records could lead to a Perl exception and program crash (CVE-2007-6341). Closes: #457445. * A very weak random number generator was used for transaction IDs (CVE-2007-3377). Perl's rand() is used in the patch against this vulnerability--it is initialized from /dev/urandom, but the underlying LCG has only got 48 bits of state, so at the very least, a brute-force attack is still possible if an attacker has got three subsequently generated transaction IDs. * The Perl implementation of dn_expand could recurse infinitely (CVE-2007-3409). (On Debian systems, the C version is typically used.) Files: 69ce0c55a0c3876faaee37e78c592ec8 916 perl optional libnet-dns-perl_0.48-1sarge1.dsc bd5bab1de250b947a3f00148d426f2e2 95754 perl optional libnet-dns-perl_0.48.orig.tar.gz 72b2f73855eceafb316f7fde51bc474e 6853 perl optional libnet-dns-perl_0.48-1sarge1.diff.gz ee51c0d78f1482161f241fa9a37aba5a 217226 perl optional libnet-dns-perl_0.48-1sarge1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iQEVAwUBR9HHAb97/wQC1SS+AQIewAgAsEUs3Dkw9KWRut/FE8Tnjzh342dl8ElO tSVSYSlY2YxyIrN/qTDt2Ze5IXcaepJZanIIkVgVj/EUVb36aCelhjeMGY/mktkE D4XR2AuU1v46bAhnnERmVOuSj0lQZ7KOLGWYKxUyh+GroUfIApvcQbBQ5abLfAj8 8G9FBJvZ2yODqbTwbaRV/wg3tS004BGKgmekA8Chs8RHcLlseRHnt2vTMAMriANW +Gt4FB0zMg3Debxr/ST1bCheLlIqIbB8NihAHAQG4C2cUcwcPzQk2uwHHWraCTaV Co0FT+7Vi+kf7jrQqM8loPK3zY8grAjlfVDBo2Ht+AA29XF3OX8prQ== =n/Em -----END PGP SIGNATURE-----
--- End Message ---