This is the mail system at host smtp.qingfeng.com.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<[email protected]>: host
bendel.debian.org[82.195.75.100] said: 550 5.7.1
<[email protected]>: Recipient address
rejected: Mail appeared to be SPAM or forged. Ask your
Mail/DNS-Administrator to correct HELO and DNS MX settings or to get
removed from DNSBLs; MTA helo: smtp.qingfeng.com, MTA hostname:
unknown[221.219.243.119] (helo/hostname mismatch) (in reply to RCPT TO
command)
Reporting-MTA: dns; smtp.qingfeng.com
X-Postfix-Queue-ID: 52736104EE9
X-Postfix-Sender: rfc822; [email protected]
Arrival-Date: Fri, 27 Oct 2017 15:20:10 +0800 (HKT)
Final-Recipient: rfc822; [email protected]
Original-Recipient: rfc822;[email protected]
Action: failed
Status: 5.7.1
Remote-MTA: dns; bendel.debian.org
Diagnostic-Code: smtp; 550 5.7.1
<[email protected]>: Recipient address
rejected: Mail appeared to be SPAM or forged. Ask your
Mail/DNS-Administrator to correct HELO and DNS MX settings or to get
removed from DNSBLs; MTA helo: smtp.qingfeng.com, MTA hostname:
unknown[221.219.243.119] (helo/hostname mismatch)
--- Begin Message ---
This automatic mail gives an overview over security issues that were recently
fixed in Debian Testing. The majority of fixed packages migrate to testing
from unstable. If this would take too long, fixed packages are uploaded to the
testing-security repository instead. It can also happen that vulnerable
packages are removed from Debian testing.
Migrated from unstable:
=======================
icedove 3.0.4-2:
CVE-2009-1571: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
CVE-2010-0159: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159
CVE-2010-0167: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167
CVE-2010-0169: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169
CVE-2010-0171: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171
CVE-2010-0173: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173
CVE-2010-0174: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174
CVE-2010-0175: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175
CVE-2010-0176: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176
CVE-2010-0182: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182
How to update:
--------------
Make sure the line
deb http://security.debian.org squeeze/updates main contrib non-free
is present in your /etc/apt/sources.list. Of course, you also need the line
pointing to your normal squeeze mirror. You can use
aptitude update && aptitude dist-upgrade
to install the updates.
More information:
-----------------
More information about which security issues affect Debian can be found in the
security tracker:
http://security-tracker.debian.org/tracker/
A list of all known unfixed security issues is at
http://security-tracker.debian.org/tracker/status/release/testing
--
To UNSUBSCRIBE, email to
[email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]
--- End Message ---
_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team