This bug was fixed in the package libspf2 - 1.2.5.dfsg-4ubuntu0.8.04.1

---------------
libspf2 (1.2.5.dfsg-4ubuntu0.8.04.1) hardy-security; urgency=low

  * SECURITY UPDATE: buffer overflow when handling DNS responses (LP: #271025)
    - debian/patches/50_dns_resolv_bufoverflow.dpatch: dynamically allocate
      responsebug and properly check txt record lengths. Thanks to Scott
      Kitterman.
    - CVE-2008-2469

 -- Jamie Strandboge <[EMAIL PROTECTED]>   Wed, 15 Oct 2008 07:43:31
-0500

** Changed in: libspf2 (Ubuntu Hardy)
       Status: Fix Committed => Fix Released

** Changed in: libspf2 (Ubuntu Gutsy)
       Status: Fix Committed => Fix Released

-- 
Multiple security vulnerabilities
https://bugs.launchpad.net/bugs/271025
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to