Your message dated Mon, 05 Feb 2007 09:17:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#409257: fixed in zabbix 1:1.1.4-8
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: zabbix
Version: 1:1.1.4-7
Severity: important
Tags: security
Hi.
The new version of Zabbix 1.1.5 solves the CVE-2007-0640.
"* fixed buffer overflow while processing SNMP IP addresses".
"Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack
vectors related to "SNMP IP addresses."
Reference:
http://www.zabbix.com/rn1.1.5.php
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0640
Note:
Please mention the CVE id in the changelog.
regards,
--
.''`.
: :' : Alex de Oliveira Silva | enerv
`. `' www.enerv.net
`-
--- End Message ---
--- Begin Message ---
Source: zabbix
Source-Version: 1:1.1.4-8
We believe that the bug you reported is fixed in the latest version of
zabbix, which is due to be installed in the Debian FTP archive:
zabbix-agent_1.1.4-8_amd64.deb
to pool/main/z/zabbix/zabbix-agent_1.1.4-8_amd64.deb
zabbix-frontend-php_1.1.4-8_all.deb
to pool/main/z/zabbix/zabbix-frontend-php_1.1.4-8_all.deb
zabbix-server-mysql_1.1.4-8_amd64.deb
to pool/main/z/zabbix/zabbix-server-mysql_1.1.4-8_amd64.deb
zabbix-server-pgsql_1.1.4-8_amd64.deb
to pool/main/z/zabbix/zabbix-server-pgsql_1.1.4-8_amd64.deb
zabbix_1.1.4-8.diff.gz
to pool/main/z/zabbix/zabbix_1.1.4-8.diff.gz
zabbix_1.1.4-8.dsc
to pool/main/z/zabbix/zabbix_1.1.4-8.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Ablassmeier <[EMAIL PROTECTED]> (supplier of updated zabbix package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 5 Feb 2007 09:47:09 +0100
Source: zabbix
Binary: zabbix-server-mysql zabbix-agent zabbix-server-pgsql zabbix-frontend-php
Architecture: source all amd64
Version: 1:1.1.4-8
Distribution: unstable
Urgency: high
Maintainer: Zabbix Maintainers <[EMAIL PROTECTED]>
Changed-By: Michael Ablassmeier <[EMAIL PROTECTED]>
Description:
zabbix-agent - software for monitoring of your networks -- agent
zabbix-frontend-php - software for monitoring of your servers -- php frontend
zabbix-server-mysql - software for monitoring of your networks -- server
zabbix-server-pgsql - software for monitoring of your networks -- server
Closes: 409257
Changes:
zabbix (1:1.1.4-8) unstable; urgency=high
.
* debian/patches/CVE-2007-0640.dpatch: fix buffer overflow related
to SNMP IP Address Handling as described in CVE-2007-0640.
Closes: #409257
Files:
823c343688a25460ce50ad152d820761 838 net optional zabbix_1.1.4-8.dsc
2148e190b1b0d8f7fefef02051832986 18393 net optional zabbix_1.1.4-8.diff.gz
c216ee59e0d30501103e0172fd9943fa 120708 net optional
zabbix-agent_1.1.4-8_amd64.deb
b75a0849854f708a5749e3e81cdf139c 187116 net optional
zabbix-server-mysql_1.1.4-8_amd64.deb
2b551e73fc81d98e72a96753a97eefc3 197674 net optional
zabbix-server-pgsql_1.1.4-8_amd64.deb
9d040333a03d58bd6296b37148a46589 337312 net optional
zabbix-frontend-php_1.1.4-8_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFxvKbEFV7g4B8rCURAiBfAJ9uaKeq70H24WuwpKQ5L09GvcX7iwCghbHP
Ggfftsm816J/D2dI6zzxL14=
=LTz4
-----END PGP SIGNATURE-----
--- End Message ---