[Secure-testing-team] Bug#497730: dns2tcp contains a buffer overflow
Arnaud Cornet
acornet at debian.org
Wed Sep 3 21:18:22 UTC 2008
Package: dns2tcp
Version: 0.4.dfsg-1
Severity: grave
Tags: security
Justification: user security hole
0.4 has a buffer overflow fixed in 0.4.1.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages dns2tcp depends on:
ii libc6 2.7-13 GNU C Library: Shared libraries
dns2tcp recommends no packages.
dns2tcp suggests no packages.
-- no debconf information
More information about the Secure-testing-team
mailing list