Your message dated Wed, 29 Aug 2007 10:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#440006: fixed in fetchmail 6.3.8-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: fetchmail
Severity: important
Tags: security

Hi!

A DoS attack in fetchmail has been publicised:

> fetchmail before 6.3.9 allows context-dependent attackers to cause a denial
> of service (NULL dereference and application crash) by refusing certain
> warning messages that are sent over SMTP.

This upstream URL has details and references which commit fixes it:
http://mknod.org/svn/fetchmail/branches/BRANCH_6-3/fetchmail-SA-2007-02.txt

Please update your package, and mention CVE-2007-4565 in your changelog. It 
would be good if you could assess the severity of this attack in the light of 
updating stable/oldstable.


thanks
Thijs

Attachment: pgp1lHTObBAGh.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: fetchmail
Source-Version: 6.3.8-8

We believe that the bug you reported is fixed in the latest version of
fetchmail, which is due to be installed in the Debian FTP archive:

fetchmail_6.3.8-8.diff.gz
  to pool/main/f/fetchmail/fetchmail_6.3.8-8.diff.gz
fetchmail_6.3.8-8.dsc
  to pool/main/f/fetchmail/fetchmail_6.3.8-8.dsc
fetchmail_6.3.8-8_i386.deb
  to pool/main/f/fetchmail/fetchmail_6.3.8-8_i386.deb
fetchmailconf_6.3.8-8_all.deb
  to pool/main/f/fetchmail/fetchmailconf_6.3.8-8_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated fetchmail package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 29 Aug 2007 12:05:09 +0200
Source: fetchmail
Binary: fetchmailconf fetchmail
Architecture: source i386 all
Version: 6.3.8-8
Distribution: unstable
Urgency: high
Maintainer: Fetchmail Maintainers <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description: 
 fetchmail  - SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
 fetchmailconf - fetchmail configurator
Closes: 440006
Changes: 
 fetchmail (6.3.8-8) unstable; urgency=high
 .
   * Including fix_CVE-2007-4565_DoS patch to fix
     Denial of Service vulnerability in sink.c
     (CVE-2007-4565) (Closes: #440006).
   * Fixed fetchmailconf menu sections.
Files: 
 1e55b40a6bc8200865add56c8ad3a39b 893 mail optional fetchmail_6.3.8-8.dsc
 96ff0c702f403d429ef9e2c77d0435f9 62698 mail optional fetchmail_6.3.8-8.diff.gz
 a9435a6e2a140277994ef9b339babd7d 61918 mail optional 
fetchmailconf_6.3.8-8_all.deb
 525f2ebddd11feb0d01f2ab8a7f1ca85 653832 mail optional 
fetchmail_6.3.8-8_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFG1UqOHYflSXNkfP8RAsluAJ4x+QUmAaHVGPwYF8eYIHKHbS7FXgCdEEIY
3MFhONOkXnKAdCdumWyymLw=
=dOOE
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to