In all fairness, if this issue is in regards to the Verisign cluster fsck I don't think this has any place in Sendmail personally but rather in getting Verisign to un-fsck the problem and/or fix DNS servers not to respond in that manner as to allow that to happen...
Regards,
Jeremy
On Thu, Sep 18, 2003 at 12:49:38PM +0900, Hideki Yamane wrote:
> Hi list,
>
> You know, as DSA-384-1, sendmail buffer overflow vulnerability
> is fixed but another hole "sendmail relay access restrictions
> can be bypassed with bogus DNS"(*) is NOT fixed yet.
>
> * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174907
>
> Do you know why maintainer let this issue alone ?
> or not effect Debian package? (if so, this bug should be closed.)
>
> --
> Regards,
>
> Hideki Yamane mailto:henrich @ iijmio-mail.jp
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
signature.asc
Description: Digital signature

