severity 553584 minor retitle CVE-2009-3641: Possible DoS using specially-crafted IPv6 packets if package is recompiled with IPv6 support thanks
On Fri, Jan 08, 2010 at 08:42:21PM +0100, Raphael Hertzog wrote: > Hi, > > On Fri, 08 Jan 2010, Moritz Muehlenhoff wrote: > > Please remove snort from testing. It has an open security bug, which hasn't > > been acknowledged since more than two months. > > I'm a bit worried that we remove (popular) software from testing instead > of fixing the underlying problem. On review. The Snort packages provided by Debian are *not* vulnerable to this bug. We do not enable IPv6 support in Snort, as we don't compile with --enable-ipv6 (!) Did somebody from the Security Team actually read the full disclosure report [1] and test wether the vulnerability was actually there? I'm downgrading the severity of the bug and will fix it with the next upstream release. Security Team, please let me know if you consider this bug merits a DSA for stable and oldstable, (I don't think it does as they are not affected unless the package is recompiled. Regards Javier [1] http://seclists.org/fulldisclosure/2009/Oct/299
signature.asc
Description: Digital signature