** Description changed: Binary package hint: dns2tcp As stated in Debian Bug #504121 and Secunia at http://secunia.com/advisories/32514/, there is a security flaw in dns2tcp, with a buffer overflow possibility in dns_decode.c This flaw has been fixed in upstream 0.4.3 version and in debian, in 0.4.dfsg-4, and the patch has been fixed in 0.4.dfsg-5. Debian changelog: dns2tcp (0.4.dfsg-5) unstable; urgency=low * Fix dnsbof.diff to add an extra check for total_len. -- Arnaud Cornet <[EMAIL PROTECTED]> Tue, 04 Nov 2008 08:53:43 +0100 dns2tcp (0.4.dfsg-4) unstable; urgency=low * Add patch dnsbof.diff to fix a buffer overflow in dns_decode.c (Closes: #504121). * Add patch sysfix.diff that fixes chroot() and set?id() calls. Also makes use of limits to prevent fork of the process. -- Arnaud Cornet <[EMAIL PROTECTED]> Fri, 31 Oct 2008 19:28:28 +0100 Upstream changelog for 0.4.3: Version 0.4.3 Fix unsigned int pb and error in dns_decode (John Lampe) Fix drop privileges problems (Solar Designer) Add limit to prevent fork() (Idea from Solar Designer) Version 0.4.2 Suppressed I compared debian patched version with upstream 0.4.3, and there is no - relevant changes to .c files, affecting to security + relevant changes to .c files, affecting security
** Description changed: Binary package hint: dns2tcp - As stated in Debian Bug #504121 and Secunia at + As stated in Debian Bug 504121 at http://bugs.debian.org/cgi- + bin/bugreport.cgi?bug=504121 and Secunia at http://secunia.com/advisories/32514/, there is a security flaw in dns2tcp, with a buffer overflow possibility in dns_decode.c This flaw has been fixed in upstream 0.4.3 version and in debian, in 0.4.dfsg-4, and the patch has been fixed in 0.4.dfsg-5. Debian changelog: dns2tcp (0.4.dfsg-5) unstable; urgency=low * Fix dnsbof.diff to add an extra check for total_len. -- Arnaud Cornet <[EMAIL PROTECTED]> Tue, 04 Nov 2008 08:53:43 +0100 dns2tcp (0.4.dfsg-4) unstable; urgency=low * Add patch dnsbof.diff to fix a buffer overflow in dns_decode.c (Closes: #504121). * Add patch sysfix.diff that fixes chroot() and set?id() calls. Also makes use of limits to prevent fork of the process. -- Arnaud Cornet <[EMAIL PROTECTED]> Fri, 31 Oct 2008 19:28:28 +0100 Upstream changelog for 0.4.3: Version 0.4.3 Fix unsigned int pb and error in dns_decode (John Lampe) Fix drop privileges problems (Solar Designer) Add limit to prevent fork() (Idea from Solar Designer) Version 0.4.2 Suppressed I compared debian patched version with upstream 0.4.3, and there is no relevant changes to .c files, affecting security -- [Sync Request] Please sync dns2tcp 0.4.dfsg-5 from Debian Unstable https://bugs.launchpad.net/bugs/297475 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs