In all fairness, if this issue is in regards to the Verisign cluster
fsck I don't think this has any place in Sendmail personally but rather
in getting Verisign to un-fsck the problem and/or fix DNS servers not to
respond in that manner as to allow that to happen...

        Regards,
        Jeremy
        
On Thu, Sep 18, 2003 at 12:49:38PM +0900, Hideki Yamane wrote:
> Hi list,
> 
>  You know, as DSA-384-1, sendmail buffer overflow vulnerability
>  is fixed but another hole "sendmail relay access restrictions 
>  can be bypassed with bogus DNS"(*) is NOT fixed yet.
> 
>  * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174907
> 
>  Do you know why maintainer let this issue alone ?
>  or not effect Debian package? (if so, this bug should be closed.)
> 
> -- 
> Regards,
> 
>  Hideki Yamane    mailto:henrich @ iijmio-mail.jp
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 

Attachment: signature.asc
Description: Digital signature

Reply via email to