Your message dated Thu, 7 Sep 2017 17:42:07 +0200
with message-id
<CAGpfsQ3iQd+1b3hN3BrJ2wO6vGQrmHAju16p=kb-gfxxte4...@mail.gmail.com>
and subject line
has caused the Debian Bug report #679189,
regarding bind9: Subject to CVE2012-1033, new version available to correct
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
679189: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679189
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: bind9
Version: 1:9.7.3.dfsg-1~squeeze5
Severity: important
Tags: upstream
We're getting hit with PCI-DSS compliance failures due to CVE-1012-1033. Per
ISC at https://www.isc.org/software/bind/advisories/cve-2012-1033, "The
following releases, 9.6-ESV-R6, 9.7.5, 9.8.2, 9.9.0, and subsequent releases
have changes to address this issue". (Never mind that this is about the dumbest
"vulnerability" that's been seen in recent memory...)
-- System Information:
Debian Release: 6.0.5
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-5-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
--
Informativa sulla Privacy: http://www.unibs.it/node/8155
--- End Message ---