This bug was fixed in the package libspf2 - 1.2.9-1
---------------
libspf2 (1.2.9-1) unstable; urgency=high
* New upstream release.
- Drops non-dfsg Free IETF internet draft, so tarball no longer needs
repacking
+ Fixes exploitable buffer overflow (LP: #287534)
+ Multiple fixes for improved RFC 4408 compliance
+ Update libspf2-2.symbols for new symbol
+ 20_spf_dns_include_std_headers.dpatch: Updated.
* Thanks to Scott Kitterman.
libspf2 (1.2.8~dfsg-1) unstable; urgency=low
* Merge changes from Ubuntu.
* Fix and tweak library dependency information (shlibs as well as
symbols).
* Upgrade to Standards-Version: 3.8.0. Changes needed:
+ Add debian/README.source (ยง 4.9).
* Bring debian/copyright a bit more up-to-date.
-- Scott Kitterman <[EMAIL PROTECTED]> Wed, 05 Nov 2008 05:03:43
+0000
** Changed in: libspf2 (Ubuntu)
Status: In Progress => Fix Released
--
Unspecified buffer overflow
https://bugs.launchpad.net/bugs/287534
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs