Your message dated Wed, 03 Sep 2008 22:17:25 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#497730: fixed in dns2tcp 0.4.dfsg-2
has caused the Debian Bug report #497730,
regarding dns2tcp contains a buffer overflow
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)
--
497730: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=497730
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: dns2tcp
Version: 0.4.dfsg-1
Severity: grave
Tags: security
Justification: user security hole
0.4 has a buffer overflow fixed in 0.4.1.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages dns2tcp depends on:
ii libc6 2.7-13 GNU C Library: Shared libraries
dns2tcp recommends no packages.
dns2tcp suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: dns2tcp
Source-Version: 0.4.dfsg-2
We believe that the bug you reported is fixed in the latest version of
dns2tcp, which is due to be installed in the Debian FTP archive:
dns2tcp_0.4.dfsg-2.diff.gz
to pool/main/d/dns2tcp/dns2tcp_0.4.dfsg-2.diff.gz
dns2tcp_0.4.dfsg-2.dsc
to pool/main/d/dns2tcp/dns2tcp_0.4.dfsg-2.dsc
dns2tcp_0.4.dfsg-2_amd64.deb
to pool/main/d/dns2tcp/dns2tcp_0.4.dfsg-2_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Arnaud Cornet <[EMAIL PROTECTED]> (supplier of updated dns2tcp package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 03 Sep 2008 23:16:34 +0200
Source: dns2tcp
Binary: dns2tcp
Architecture: source amd64
Version: 0.4.dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Arnaud Cornet <[EMAIL PROTECTED]>
Changed-By: Arnaud Cornet <[EMAIL PROTECTED]>
Description:
dns2tcp - TCP over DNS tunnel client and server
Closes: 497730
Changes:
dns2tcp (0.4.dfsg-2) unstable; urgency=low
.
* Fix buffer overflow by importing code change from upstream 0.4.1 (Closes:
#497730).
* Change my mail address.
Checksums-Sha1:
cc61663b8ae85bdc003521a0465a300ee6d8587f 981 dns2tcp_0.4.dfsg-2.dsc
a05c68b6bc3fb156d3d97e05ca01e97236493d05 1829 dns2tcp_0.4.dfsg-2.diff.gz
4666ca6184755b2e2d9c057b411e463df1ca6fd7 31674 dns2tcp_0.4.dfsg-2_amd64.deb
Checksums-Sha256:
e62d84025cb6934e95459cd9a6a89dd5d5f970965f1cacabb2d46134ef549094 981
dns2tcp_0.4.dfsg-2.dsc
a4d33904ceb75ca8993b3be38ca56fdc168c6ef45eeb7ce6d67133c839a0cffe 1829
dns2tcp_0.4.dfsg-2.diff.gz
72aee4ef3b5e7f542e5bb7ecbd86835b805c9aa6e0620b039c47bbb060eef462 31674
dns2tcp_0.4.dfsg-2_amd64.deb
Files:
89c8ba4cb7e9bfc3902b248596c95405 981 net optional dns2tcp_0.4.dfsg-2.dsc
9d496585363c2f2a0fe015060ed97b44 1829 net optional dns2tcp_0.4.dfsg-2.diff.gz
03d7c408d3d3079f3dfe4c8f4879ae67 31674 net optional
dns2tcp_0.4.dfsg-2_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAki/CQQACgkQsk+dgCIlhI40lACfR7IN3USOEx0EtV5BzKagXkQ+
/W8An2xQh99AS/z8+dZLudxUaftxDwYx
=wmAc
-----END PGP SIGNATURE-----
--- End Message ---