Your message dated Tue, 16 Oct 2007 19:56:45 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#444460: fixed in openssl097 0.9.7k-3.1etch1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: openssl
Version: 0.9.8c-4, 0.9.7e-3sarge4
Severity: critical
Tags: sarge, etch, security

According to http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
(http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135 is not
yet available):

Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary
code via a crafted packet that triggers a one-byte buffer underflow.

According to the German IT news magazin "Heise Online", 0.9.7m and
0.9.8e are also affected:
http://www.heise.de/security/news/meldung/96710

Original source seems to be this Bugtraq posting:
http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded

According to this posting, all lower versions are affected, too.

The release dates of 0.9.8e and 0.9.7m and the time line in the above
mentioned Bugtraq posting suggest that not only 0.9.7l and 0.9.8d but
also 0.9.7m and 0.9.8e are affected -- as Heise wrote.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.22.3-amd64-1
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages openssl depends on:
ii  libc6                  2.3.6.ds1-13etch2 GNU C Library: Shared libraries
ii  libssl0.9.8            0.9.8c-4          SSL shared libraries
ii  zlib1g                 1:1.2.3-13        compression library - runtime

openssl recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: openssl097
Source-Version: 0.9.7k-3.1etch1

We believe that the bug you reported is fixed in the latest version of
openssl097, which is due to be installed in the Debian FTP archive:

libssl0.9.7-dbg_0.9.7k-3.1etch1_i386.deb
  to pool/main/o/openssl097/libssl0.9.7-dbg_0.9.7k-3.1etch1_i386.deb
libssl0.9.7_0.9.7k-3.1etch1_i386.deb
  to pool/main/o/openssl097/libssl0.9.7_0.9.7k-3.1etch1_i386.deb
openssl097_0.9.7k-3.1etch1.diff.gz
  to pool/main/o/openssl097/openssl097_0.9.7k-3.1etch1.diff.gz
openssl097_0.9.7k-3.1etch1.dsc
  to pool/main/o/openssl097/openssl097_0.9.7k-3.1etch1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <[EMAIL PROTECTED]> (supplier of updated openssl097 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 29 Sep 2007 11:39:38 +0200
Source: openssl097
Binary: libssl0.9.7-dbg libssl0.9.7
Architecture: source i386
Version: 0.9.7k-3.1etch1
Distribution: stable-security
Urgency: low
Maintainer: [EMAIL PROTECTED]
Changed-By: Kurt Roeckx <[EMAIL PROTECTED]>
Description: 
 libssl0.9.7 - SSL shared libraries
 libssl0.9.7-dbg - Symbol tables for libssl and libcrypt
Closes: 444460
Changes: 
 openssl097 (0.9.7k-3.1etch1) stable-security; urgency=low
 .
   * CVE-2007-5135: Fix off by one error in SSL_get_shared_ciphers().
    (Closes: #444460)
Files: 
 b7a4e535383394c3be009e3a1df09bdd 769 utils optional 
openssl097_0.9.7k-3.1etch1.dsc
 be6bba1d67b26eabb48cf1774925416f 3292692 utils optional 
openssl097_0.9.7k.orig.tar.gz
 dc2f489812286cecb705f5b77d523a1e 33285 utils optional 
openssl097_0.9.7k-3.1etch1.diff.gz
 cded472858b38935b95aa798e72e0555 2284392 oldlibs extra 
libssl0.9.7_0.9.7k-3.1etch1_i386.deb
 4f181f50322b488f9eed50fc167d0712 4642676 libdevel extra 
libssl0.9.7-dbg_0.9.7k-3.1etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG/laTYrVLjBFATsMRAo0yAJsExpmRPLuIlLQ5XFAK856eQbGHCQCeMYCI
u25c08lt1khFbn9Pruz643I=
=LZCJ
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to