This bug was fixed in the package libspf2 - 1.2.5.dfsg-4ubuntu0.8.04.1
--------------- libspf2 (1.2.5.dfsg-4ubuntu0.8.04.1) hardy-security; urgency=low
* SECURITY UPDATE: buffer overflow when handling DNS responses (LP: #271025) - debian/patches/50_dns_resolv_bufoverflow.dpatch: dynamically allocate responsebug and properly check txt record lengths. Thanks to Scott Kitterman. - CVE-2008-2469
-- Jamie Strandboge <email address hidden> Wed, 15 Oct 2008 07:43:31 -0500
This bug was fixed in the package libspf2 - 1.2.5.dfsg- 4ubuntu0. 8.04.1
--------------- dfsg-4ubuntu0. 8.04.1) hardy-security; urgency=low
libspf2 (1.2.5.
* SECURITY UPDATE: buffer overflow when handling DNS responses (LP: #271025) patches/ 50_dns_ resolv_ bufoverflow. dpatch: dynamically allocate
- debian/
responsebug and properly check txt record lengths. Thanks to Scott
Kitterman.
- CVE-2008-2469
-- Jamie Strandboge <email address hidden> Wed, 15 Oct 2008 07:43:31 -0500