Your message dated Sat, 03 Dec 2022 15:39:44 +0000
with message-id <[email protected]>
and subject line Bug#702914: fixed in libnet-server-perl 2.013-1
has caused the Debian Bug report #702914,
regarding libnet-server-perl: CVE-2013-1841: Improper reverse DNS matching
check for the given hostname
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
702914: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702914
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libnet-server-perl
Severity: important
Tags: security
Control: forwarded -1 https://rt.cpan.org/Ticket/Display.html?id=83909
Hi
It was reported to the oss-security list[1] that libnet-server-perl
does not check the reverse DNS lookup hostname again by doing a
forward lookup and checking that it matches the original ip.
[1]: http://www.openwall.com/lists/oss-security/2013/03/04/10
See also
[2]: https://security-tracker.debian.org/CVE-2013-1841
[3]: https://rt.cpan.org/Ticket/Display.html?id=83909
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: libnet-server-perl
Source-Version: 2.013-1
Done: gregor herrmann <[email protected]>
We believe that the bug you reported is fixed in the latest version of
libnet-server-perl, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
gregor herrmann <[email protected]> (supplier of updated libnet-server-perl
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 03 Dec 2022 15:52:00 +0100
Source: libnet-server-perl
Architecture: source
Version: 2.013-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Perl Group <[email protected]>
Changed-By: gregor herrmann <[email protected]>
Closes: 702914
Changes:
libnet-server-perl (2.013-1) unstable; urgency=medium
.
* Import upstream version 2.013.
2.011 adds 'double_reverse_lookups' configuration and code as a fix for
"CVE-2013-1841: Improper reverse DNS matching check for the given
hostname".
This can be enabled by setting 'reverse_lookups=double' or
'double_reverse_lookups=1'. Cf. Net::Server(3pm) and CPAN RT#83909.
(Closes: #702914)
* debian/watch: use uscan macros.
* Drop patches applied upstream.
* Update years of upstream copyright.
* Refresh test and runtime dependencies.
Checksums-Sha1:
1894e2628c992156bd058c5bb6b944be3bca8ca0 2687 libnet-server-perl_2.013-1.dsc
2139d1dcee76749d03d877c6a03f8eec80df046a 154660
libnet-server-perl_2.013.orig.tar.gz
5f69d2def5900e8f8160ab134a3d07b90c71b009 6736
libnet-server-perl_2.013-1.debian.tar.xz
Checksums-Sha256:
9f3865fae040158b06c223597ffb8e3cc2e4c39ad061e9ea898220c29e08e6ee 2687
libnet-server-perl_2.013-1.dsc
cd8ae3ad26a6bd8fece76aaf4b260818b3e991844a5c341bfe36523f6ba50940 154660
libnet-server-perl_2.013.orig.tar.gz
f572b71f807d7e9ddd6ecd41c60c32d63dd7df3f7cfeadcec68911846d2c9d65 6736
libnet-server-perl_2.013-1.debian.tar.xz
Files:
5091bd56ebf366a7d4c2942b592b0761 2687 perl optional
libnet-server-perl_2.013-1.dsc
74e903c6e94297df324f7cb65c20fd80 154660 perl optional
libnet-server-perl_2.013.orig.tar.gz
7ee3bf8b594def188d756a86f6accfc6 6736 perl optional
libnet-server-perl_2.013-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=mJKL
-----END PGP SIGNATURE-----
--- End Message ---