Your message dated Fri, 7 Sep 2007 15:25:30 +0200 with message-id <[EMAIL PROTECTED]> and subject line CVE-2007-4743 Incorrect fix for CVE-2007-3999 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: krb5 Version: 1.6.dfsg.1-7 Severity: grave Tags: security Hi, a CVE was published for krb5. CVE-2007-4743[0]: The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack. Please include the CVE id in your fix. I have an NMU package ready, if you have no time or you are not fast enough I would also NMU the package :) [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4743 Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.pgpPix0i0iqZj.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---Hi, I don't know how you uploaded a package on 4 September with an updated patch published on 5 September. Anyway, cool you did, so I close this bug. Kind regards Nico -- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.pgpurhfkdKB6v.pgp
Description: PGP signature
--- End Message ---