[Secure-testing-team] Bug#504121: dns2tcp: Buffer overflow in dns_decode.c
Arnaud Cornet
acornet at debian.org
Fri Oct 31 18:25:19 UTC 2008
Package: dns2tcp
Version: 0.4.dfsg-3
Severity: grave
Tags: security
Justification: user security hole
dns_decode.c contains a security flaw fixed in 0.4.2.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages dns2tcp depends on:
ii libc6 2.7-15 GNU C Library: Shared libraries
dns2tcp recommends no packages.
dns2tcp suggests no packages.
-- no debconf information
More information about the Secure-testing-team
mailing list