[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#564248: RM: snort/2.8.4.1-6



severity 553584 minor
retitle CVE-2009-3641: Possible DoS using specially-crafted IPv6 packets if package is recompiled with IPv6 support 
thanks


On Fri, Jan 08, 2010 at 08:42:21PM +0100, Raphael Hertzog wrote:
> Hi,
> 
> On Fri, 08 Jan 2010, Moritz Muehlenhoff wrote:
> > Please remove snort from testing. It has an open security bug, which hasn't
> > been acknowledged since more than two months.
> 
> I'm a bit worried that we remove (popular) software from testing instead
> of fixing the underlying problem.

On review. The Snort packages provided by Debian are *not* vulnerable to this
bug. We do not enable IPv6 support in Snort, as we don't compile with
--enable-ipv6 (!)

Did somebody from the Security Team actually read the full disclosure report
[1] and test wether the vulnerability was actually there?

I'm downgrading the severity of the bug and will fix it with the next
upstream release.

Security Team, please let me know if you consider this bug merits a DSA for
stable and oldstable, (I don't think it does as they are not affected unless
the package is recompiled.


Regards

Javier

[1] http://seclists.org/fulldisclosure/2009/Oct/299

Attachment: signature.asc
Description: Digital signature


Reply to: