[Secure-testing-team] Bug#497730: dns2tcp contains a buffer overflow

Arnaud Cornet acornet at debian.org
Wed Sep 3 21:18:22 UTC 2008


Package: dns2tcp
Version: 0.4.dfsg-1
Severity: grave
Tags: security
Justification: user security hole

0.4 has a buffer overflow fixed in 0.4.1.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages dns2tcp depends on:
ii  libc6                         2.7-13     GNU C Library: Shared libraries

dns2tcp recommends no packages.

dns2tcp suggests no packages.

-- no debconf information





More information about the Secure-testing-team mailing list