Rev 29 | Rev 39 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 29 | Rev 38 | ||
|---|---|---|---|
| Line -... | Line 1... | ||
| - | 1 | libspf2 (1.2.5.dfsg-5+lenny2) testing-security; urgency=high |
|
| - | 2 | ||
| - | 3 | * 51_actually-keep-track-of-max_var_len.dpatch: Fix possible DoS with |
|
| - | 4 | long sender addresses. Thanks to Hannah Schroeter. |
|
| - | 5 | ||
| - | 6 | -- Magnus Holmgren <holmgren@debian.org> Tue, 04 Nov 2008 21:56:56 +0100 |
|
| - | 7 | ||
| 1 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
8 | libspf2 (1.2.5.dfsg-5+lenny1) testing-security; urgency=high |
| 2 | 9 | ||
| 3 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
10 | * [CVE-2008-2469] 50_dns_resolv_bufoverflow.dpatch: Fix buffer overflows |
| 4 | in DNS response parsing. |
11 | in DNS response parsing. |
| 5 | 12 | ||