This bug was fixed in the package libspf2 - 1.2.9-1

---------------
libspf2 (1.2.9-1) unstable; urgency=high

  * New upstream release.
    - Drops non-dfsg Free IETF internet draft, so tarball no longer needs
      repacking
    + Fixes exploitable buffer overflow (LP: #287534)
    + Multiple fixes for improved RFC 4408 compliance
    + Update libspf2-2.symbols for new symbol
        + 20_spf_dns_include_std_headers.dpatch: Updated.
  * Thanks to Scott Kitterman.

libspf2 (1.2.8~dfsg-1) unstable; urgency=low

  * Merge changes from Ubuntu.
  * Fix and tweak library dependency information (shlibs as well as
    symbols).
  * Upgrade to Standards-Version: 3.8.0. Changes needed:
    + Add debian/README.source (ยง 4.9).
  * Bring debian/copyright a bit more up-to-date.

 -- Scott Kitterman <[EMAIL PROTECTED]>   Wed,  05 Nov 2008 05:03:43
+0000

** Changed in: libspf2 (Ubuntu)
       Status: In Progress => Fix Released

-- 
Unspecified buffer overflow
https://bugs.launchpad.net/bugs/287534
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to