Rev 39 | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 39 | Rev 40 | ||
---|---|---|---|
Line 4... | Line 4... | ||
4 | long sender addresses. Thanks to Hannah Schroeter. |
4 | long sender addresses. Thanks to Hannah Schroeter. |
5 | * 52_compile_bufoverflow.dpatch: Prevent buffer overflows in SPF_compile |
5 | * 52_compile_bufoverflow.dpatch: Prevent buffer overflows in SPF_compile |
6 | from mechanisms with huge domainspecs. Workaround suggested by |
6 | from mechanisms with huge domainspecs. Workaround suggested by |
7 | upstream. Limits the size of mechanisms and modifiers, but that |
7 | upstream. Limits the size of mechanisms and modifiers, but that |
8 | shouldn't be a problem in practice. |
8 | shouldn't be a problem in practice. |
- | 9 | * 42_empty_sender.dpatch could previously cause segfaults by trying to |
|
- | 10 | write to a constant string. Fixed. |
|
9 | 11 | ||
10 | -- Magnus Holmgren <holmgren@debian.org> Wed, 05 Nov 2008 10:34:13 +0100 |
12 | -- Magnus Holmgren <holmgren@debian.org> Wed, 05 Nov 2008 10:37:20 +0100 |
11 | 13 | ||
12 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
14 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
13 | 15 | ||
14 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
16 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
15 | in DNS response parsing. |
17 | in DNS response parsing. |