Ubuntu 6614 Published by

A new libnet-dns-perl vulnerabilities update is available for Ubuntu Linux. Here the announcement:



Ubuntu Security Notice USN-483-1 July 11, 2007
libnet-dns-perl vulnerabilities
CVE-2007-3377, CVE-2007-3409
==========================
==========================
=========

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libnet-dns-perl 0.53-2ubuntu1

Ubuntu 6.10:
libnet-dns-perl 0.57-1ubuntu1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Peter Johannes Holzer discovered that the Net::DNS Perl module had
predictable sequence numbers. This could allow remote attackers to
carry out DNS spoofing, leading to possible man-in-the-middle attacks.
(CVE-2007-3377)

Steffen Ullrich discovered that the Net::DNS Perl module did not correctly
detect recursive compressed responses. A remote attacker could send a
specially crafted packet, causing applications using Net::DNS to crash or
monopolize CPU resources, leading to a denial of service. (CVE-2007-3409)


Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1.diff.gz
Size/MD5: 7131 70259d4b019c88756acdc478ab118a0c
http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1.dsc
Size/MD5: 627 fa7fcd8cdc159da4f9a79894cae8faf0
http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53.orig.tar.gz
Size/MD5: 119705 404797359373d4df1a025458ab1415f7

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1_amd64.deb
Size/MD5: 232844 881048cba320ec704a85492a6b8028a0

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1_i386.deb
Size/MD5: 232552 ed88d115cdd906e908c09665626e66c4

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1_powerpc.deb
Size/MD5: 234402 5ac3c021022fa9b08b9be3aa46699b58

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.53-2ubuntu1_sparc.deb
Size/MD5: 232636 2b495db82b81a3daff733c2bf89a1027

Updated packages for Ubuntu 6.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1.diff.gz
Size/MD5: 7117 87cf1c8bbc75b5204b36241cc41aabc8
http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1.dsc
Size/MD5: 627 42e5028e8040e4afb580bd9391fa7c59
http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57.orig.tar.gz
Size/MD5: 131596 9511a7052e553f2a29a5bae32c20bc44

amd64 architecture (Athlon64, Opteron, EM64T Xeon)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1_amd64.deb
Size/MD5: 246138 da3ffaaffe0ce85cd48dd0ede6285a99

i386 architecture (x86 compatible Intel/AMD)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1_i386.deb
Size/MD5: 246066 0e9b1b5f3f87987c1945d084e2661679

powerpc architecture (Apple Macintosh G3/G4/G5)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1_powerpc.deb
Size/MD5: 247754 abc142bad486a1b35801729ad15522c7

sparc architecture (Sun SPARC/UltraSPARC)

http://security.ubuntu.com/ubuntu/pool/main/libn/libnet-dns-perl/libnet=
-dns-perl_0.57-1ubuntu1_sparc.deb
Size/MD5: 245998 a919000288982eebcedc9a96862bd4b1


--mxv5cy4qt+RJ9ypb
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGl8sUH/9LqRcGPm0RAqjxAJ9aSF9H9GGgn6hqO5JG30Cg+Ljy6QCfQu5x
RXdnNZFqw2jiHPQeKm1Pi9E=
=cLHE
-----END PGP SIGNATURE-----