Your message dated Sat, 11 Mar 2006 15:24:31 +1100
with message-id <[EMAIL PROTECTED]>
and subject line close duplicate report
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: sa-exim
Version: 4.2-2
Severity: critical
Tags: security

The new upstream release (2006/01/09 - v4.2.1) states:

Security update (reported by Chris Morris) 
Modified Greylisting.pm not to generate tuplets with spaces, although
the cleaning cron job is now safe with regard to whitespace 
Included Mark Lawrence's perl script to better clean old tuplets 
The default config now ships with the greylistclean cronjob running as
nobody (which spamd should be running as, too)

http://marc.merlins.org/linux/exim/sa.html


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-2-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages sa-exim depends on:
ii  debconf [debconf-2.0]         1.4.51     Debian configuration management sy
ii  exim4-daemon-light            4.52-1     lightweight exim MTA (v4) daemon
ii  libc6                         2.3.6-1    GNU C Library: Shared libraries an
ii  spamc                         3.0.4-2    Client for SpamAssassin spam filte

sa-exim recommends no packages.

-- debconf information:
  sa-exim/purge_spool: false


--- End Message ---
--- Begin Message ---
Hi Mark,

Thanks for your report; I'm closing it because:
        - it is already reported (345071)

        - this isn't critical "introduces a security hole on systems
          where you install the package." because a) it isn't installed
          by default and b) I've already patched in a fix for sa-exim
          which is in both unstable and testing.

        - the remainder of the report ("new upstream") is also covered
          by other reports.

Thanks,
Anand

-- 
 `When any government, or any church for that matter, undertakes to say to
  its subjects, "This you may not read, this you must not see, this you are
  forbidden to know," the end result is tyranny and oppression no matter how
  holy the motives' -- Robert A Heinlein, "If this goes on --"

--- End Message ---

Reply via email to