Rev 29 | Rev 39 | Go to most recent revision | Show entire file | Regard whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 29 | Rev 38 | ||
---|---|---|---|
Line -... | Line 1... | ||
- | 1 | libspf2 (1.2.5.dfsg-5+lenny2) testing-security; urgency=high |
|
- | 2 | ||
- | 3 | * 51_actually-keep-track-of-max_var_len.dpatch: Fix possible DoS with |
|
- | 4 | long sender addresses. Thanks to Hannah Schroeter. |
|
- | 5 | ||
- | 6 | -- Magnus Holmgren <holmgren@debian.org> Tue, 04 Nov 2008 21:56:56 +0100 |
|
- | 7 | ||
1 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
8 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
2 | 9 | ||
3 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
10 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
4 | in DNS response parsing. |
11 | in DNS response parsing. |
5 | 12 |