Your message dated Sat, 26 Jul 2008 09:58:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#475163: fixed in sympa 5.2.3-1.2+etch1
has caused the Debian Bug report #475163,
regarding sympa: CVE-2008-1648 denial of service via crafted email
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
475163: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475163
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: sympa
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for sympa.


CVE-2008-1648[0]:
| Sympa before 5.4 allows remote attackers to cause a denial of service
| (daemon crash) via an e-mail message with a malformed value of the
| Content-Type header and unspecified other headers.  NOTE: some of these
| details are obtained from third party information.

First apply this patch:
http://sourcesup.cru.fr/cgi/viewvc.cgi/trunk/src/PlainDigest.pm?r1=3597&r2=4834&view=patch
and then this patch:
http://sourcesup.cru.fr/cgi/viewvc.cgi/trunk/src/PlainDigest.pm?r1=4834&r2=4835&view=patch

to fix the problem.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1648
    http://security-tracker.debian.net/tracker/CVE-2008-1648

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpBVwfrcIBJN.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: sympa
Source-Version: 5.2.3-1.2+etch1

We believe that the bug you reported is fixed in the latest version of
sympa, which is due to be installed in the Debian FTP archive:

sympa_5.2.3-1.2+etch1.diff.gz
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1.diff.gz
sympa_5.2.3-1.2+etch1.dsc
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1.dsc
sympa_5.2.3-1.2+etch1_amd64.deb
  to pool/main/s/sympa/sympa_5.2.3-1.2+etch1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Steve Kemp <[EMAIL PROTECTED]> (supplier of updated sympa package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 30 Jun 2008 16:17:18 +0000
Source: sympa
Binary: sympa
Architecture: source amd64
Version: 5.2.3-1.2+etch1
Distribution: stable-security
Urgency: high
Maintainer: Stefan Hornburg (Racke) <[EMAIL PROTECTED]>
Changed-By: Steve Kemp <[EMAIL PROTECTED]>
Description: 
 sympa      - Modern mailing list manager
Closes: 475163
Changes: 
 sympa (5.2.3-1.2+etch1) stable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Fix possible denial of service attack triggered
     via a malformed email header (CVE-2008-1648; Closes: #475163).
Files: 
 c7e720e56b1c4e9778cea822ed150a19 625 mail optional sympa_5.2.3-1.2+etch1.dsc
 355cb9174841205831191c93a83da895 5102528 mail optional sympa_5.2.3.orig.tar.gz
 a93d8ec3dcbc0a0aed99e513c5749c0e 96804 mail optional 
sympa_5.2.3-1.2+etch1.diff.gz
 531781d522ad5f02e6c5b658883ed37d 3591854 mail optional 
sympa_5.2.3-1.2+etch1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkho/OcACgkQwM/Gs81MDZ1DggCguWHsxIkq6/qH4sS2fwWoSkjK
xAcAoJ1EpG6z5ZmlVxYr5w0bvbS3/e2U
=6Xn8
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to