Lucene search

K
debianDebianDEBIAN:76130F3C116EA0358DB599C28745C8F4:3A789
HistoryOct 22, 2008 - 9:56 a.m.

[Backports-security-announce] Security Update for libspf2

2008-10-2209:56:20
lists.debian.org
6

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.911 High

EPSS

Percentile

98.9%

Gerfried Fuchs uploaded new packages for libspf2 which fixed the
following security problem:

CVE-2008-2469

Fix buffer overflows in DNS response parsing.

For the etch-backports distribution the problem has been fixed in
version 1.2.5.dfsg-5+lenny1~bpo40+1.

For the lenny distribution the problem has been fixed in version
1.2.5.dfsg-5+lenny1.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:

Package: *
Pin: release a=etch-backports
Pin-Priority: 200
Attachment:
signature.asc
Description: Digital signature

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.911 High

EPSS

Percentile

98.9%