Your message dated Mon, 20 Feb 2017 00:18:32 +0000
with message-id <e1cfbgw-0004j5...@fasolo.debian.org>
and subject line Bug#855540: fixed in bind9 1:9.10.3.dfsg.P4-12
has caused the Debian Bug report #855540,
regarding bind9: CVE-2016-8864 causes more regressions
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
855540: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855540
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
package: src:bind9
severity: grave
version: 1:9.10.3.dfsg.P4-11

The fix for this issue causes more regressions.

--- End Message ---
--- Begin Message ---
Source: bind9
Source-Version: 1:9.10.3.dfsg.P4-12

We believe that the bug you reported is fixed in the latest version of
bind9, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 855...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Gilbert <mgilb...@debian.org> (supplier of updated bind9 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 19 Feb 2017 22:39:32 +0000
Source: bind9
Binary: bind9 bind9utils bind9-doc host bind9-host libbind-dev libbind9-140 
libdns162 libirs141 libisc160 liblwres141 libisccc140 libisccfg140 dnsutils 
lwresd libbind-export-dev libdns-export162 libdns-export162-udeb 
libisc-export160 libisc-export160-udeb libisccfg-export140 libisccc-export140 
libisccc-export140-udeb libisccfg-export140-udeb libirs-export141 
libirs-export141-udeb
Architecture: source
Version: 1:9.10.3.dfsg.P4-12
Distribution: unstable
Urgency: high
Maintainer: LaMont Jones <lam...@debian.org>
Changed-By: Michael Gilbert <mgilb...@debian.org>
Description:
 bind9      - Internet Domain Name Server
 bind9-doc  - Documentation for BIND
 bind9-host - Version of 'host' bundled with BIND 9.X
 bind9utils - Utilities for BIND
 dnsutils   - Clients provided with BIND
 host       - Transitional package
 libbind-dev - Static Libraries and Headers used by BIND
 libbind-export-dev - Development files for the exported BIND libraries
 libbind9-140 - BIND9 Shared Library used by BIND
 libdns-export162 - Exported DNS Shared Library
 libdns-export162-udeb - Exported DNS library for debian-installer (udeb)
 libdns162  - DNS Shared Library used by BIND
 libirs-export141 - Exported IRS Shared Library
 libirs-export141-udeb - Exported IRS library for debian-installer (udeb)
 libirs141  - DNS Shared Library used by BIND
 libisc-export160 - Exported ISC Shared Library
 libisc-export160-udeb - Exported ISC library for debian-installer (udeb)
 libisc160  - ISC Shared Library used by BIND
 libisccc-export140 - Command Channel Library used by BIND
 libisccc-export140-udeb - Command Channel Library used by BIND (udeb)
 libisccc140 - Command Channel Library used by BIND
 libisccfg-export140 - Exported ISC CFG Shared Library
 libisccfg-export140-udeb - Exported ISC CFG library for debian-installer (udeb)
 libisccfg140 - Config File Handling Library used by BIND
 liblwres141 - Lightweight Resolver Library used by BIND
 lwresd     - Lightweight Resolver Daemon
Closes: 855520 855540
Changes:
 bind9 (1:9.10.3.dfsg.P4-12) unstable; urgency=high
 .
   * Merge and accept the non-maintainer upload.
   * Fix regression caused by the fix for CVE-2016-8864 (closes: #855540).
   * Fix CVE-2017-3135: a malicously crafted query can cause named to crash if
     both DNS64 and RPZ are being used (closes: #855520).
Checksums-Sha1:
 cd4efb9437799bff31f0b5251513959503148761 4445 bind9_9.10.3.dfsg.P4-12.dsc
 7bf13585e34a94c3d1ea6938c3f9bc72659aa70e 75356 
bind9_9.10.3.dfsg.P4-12.debian.tar.xz
 74126b1564fa9b3764c3ff90f2e2cfcff5a3ebcb 6472 
bind9_9.10.3.dfsg.P4-12_source.buildinfo
Checksums-Sha256:
 48575f80b38180180159a3bcb503c4524469ee9e76680a233d7e1420b59f7060 4445 
bind9_9.10.3.dfsg.P4-12.dsc
 0dcf4a2839ffebd5163c225df8de056357e296d7c085aee222605a033852aea6 75356 
bind9_9.10.3.dfsg.P4-12.debian.tar.xz
 e1b31b73ed6fe72f2d4fbf3ccfe2589266cf6b4a80b47a6c491c269d811976dd 6472 
bind9_9.10.3.dfsg.P4-12_source.buildinfo
Files:
 07d6df9d339625267747caa14bb682f6 4445 net optional bind9_9.10.3.dfsg.P4-12.dsc
 4b0854cc133aa88b95da5105f7a3cca6 75356 net optional 
bind9_9.10.3.dfsg.P4-12.debian.tar.xz
 122bec7c1b64c082261faff6255d7489 6472 net optional 
bind9_9.10.3.dfsg.P4-12_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=tt38
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to