Your message dated Fri, 20 Jan 2006 14:32:40 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#348826: fixed in mydns 1.1.0+pre-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 19 Jan 2006 08:34:45 +0000
>From [EMAIL PROTECTED] Thu Jan 19 00:34:45 2006
Return-path: <[EMAIL PROTECTED]>
Received: from mail.gmx.net ([213.165.64.21])
        by spohr.debian.org with smtp (Exim 4.50)
        id 1EzVFl-0001VN-IN
        for [EMAIL PROTECTED]; Thu, 19 Jan 2006 00:34:45 -0800
Received: (qmail 12021 invoked by uid 0); 19 Jan 2006 08:34:14 -0000
Received: from 138.232.247.70 by www002.gmx.net with HTTP;
        Thu, 19 Jan 2006 09:34:14 +0100 (MET)
Date: Thu, 19 Jan 2006 09:34:14 +0100 (MET)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
MIME-Version: 1.0
Subject: DoS vulnerability
X-Priority: 3 (Normal)
X-Authenticated: #4483743
Message-ID: <[EMAIL PROTECTED]>
X-Mailer: WWW-Mail 1.6 (Global Message Exchange)
X-Flags: 0001
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.5 required=4.0 tests=BAYES_44,HAS_PACKAGE,
        NO_REAL_NAME autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: mydns
Version:  1.0.0-4

1.0.0 contains a security bug which was fixed
in yesterday's released mydns 1.1.0 version:

18 January 2006 - 1.1.0 released
- fixed a critical denial-of-service vulnerability

-- 
10 GB Mailbox, 100 FreeSMS/Monat http://www.gmx.net/de/go/topmail
+++ GMX - die erste Adresse für Mail, Message, More +++

---------------------------------------
Received: (at 348826-close) by bugs.debian.org; 20 Jan 2006 22:40:50 +0000
>From [EMAIL PROTECTED] Fri Jan 20 14:40:50 2006
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1F04oC-000397-6V; Fri, 20 Jan 2006 14:32:40 -0800
From: Philipp Kern <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#348826: fixed in mydns 1.1.0+pre-3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 20 Jan 2006 14:32:40 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: mydns
Source-Version: 1.1.0+pre-3

We believe that the bug you reported is fixed in the latest version of
mydns, which is due to be installed in the Debian FTP archive:

mydns-common_1.1.0+pre-3_all.deb
  to pool/main/m/mydns/mydns-common_1.1.0+pre-3_all.deb
mydns-mysql_1.1.0+pre-3_i386.deb
  to pool/main/m/mydns/mydns-mysql_1.1.0+pre-3_i386.deb
mydns-pgsql_1.1.0+pre-3_i386.deb
  to pool/main/m/mydns/mydns-pgsql_1.1.0+pre-3_i386.deb
mydns_1.1.0+pre-3.diff.gz
  to pool/main/m/mydns/mydns_1.1.0+pre-3.diff.gz
mydns_1.1.0+pre-3.dsc
  to pool/main/m/mydns/mydns_1.1.0+pre-3.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Philipp Kern <[EMAIL PROTECTED]> (supplier of updated mydns package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 20 Jan 2006 22:24:31 +0100
Source: mydns
Binary: mydns-pgsql mydns-common mydns-mysql
Architecture: source i386 all
Version: 1.1.0+pre-3
Distribution: unstable
Urgency: high
Maintainer: Philipp Kern <[EMAIL PROTECTED]>
Changed-By: Philipp Kern <[EMAIL PROTECTED]>
Description: 
 mydns-common - DNS server using a SQL database for data storage
 mydns-mysql - DNS server using MySQL for data storage
 mydns-pgsql - DNS server using PostgreSQL for data storage
Closes: 348826
Changes: 
 mydns (1.1.0+pre-3) unstable; urgency=high
 .
   * Fix a critical remote DDoS, caused by a missing pointer check.
     (Closes: #348826)
Files: 
 b30dea8f9ff5e9dcb5c58cfa6f002213 666 net optional mydns_1.1.0+pre-3.dsc
 fc89632aab1da2ac8eadbf8c9d96cd5d 18850 net optional mydns_1.1.0+pre-3.diff.gz
 b6dbe22c6ca5e6d3cbe38a7f399bf1a2 33360 net optional 
mydns-common_1.1.0+pre-3_all.deb
 794a44253a694a1fb85fede4983c8a59 683772 net optional 
mydns-mysql_1.1.0+pre-3_i386.deb
 622ce50ae936e576f8cb34ac87d6490c 166514 net optional 
mydns-pgsql_1.1.0+pre-3_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD0WAM7Ro5M7LPzdgRApjEAJwLqt0PVYkh1PmKuFRJ/BhOrEBdNwCdHhNx
E8lKISvdelNREPfgr1M0lHU=
=f5C+
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to