- Update to 2.50, complete changelog: Fix security problem which allowed any host permitted to do TFTP to possibly compromise dnsmasq by remote buffer overflow when TFTP enabled. Thanks to Core Security Technologies and Iván Arce, Pablo Hernán Jorge, Alejandro Pablo Rodriguez, MartÃn Coco, Alberto Soliño Testa and Pablo Annetta. This problem has Bugtraq id: 36121 and CVE: 2009-2957 Fix a problem which allowed a malicious TFTP client to crash dnsmasq. Thanks to Steve Grubb at Red Hat for spotting this. This problem has Bugtraq id: 36120 and CVE: 2009-2958 Generated with FreeBSD Port Tools 0.77
Responsible Changed From-To: freebsd-ports-bugs->miwi I'll take it.
miwi 2009-09-02 12:18:10 UTC FreeBSD ports repository Modified files: dns/dnsmasq Makefile distinfo Log: - Update to 2.50 PR: 138415 Submitted by: Matthias Andree <matthias.andree@gmx.de> (maintainer) Security: http://www.freebsd.org/ports/portaudit/80aa98e0-97b4-11de-b946-0030843d3802.html Revision Changes Path 1.56 +1 -2 ports/dns/dnsmasq/Makefile 1.40 +3 -3 ports/dns/dnsmasq/distinfo _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
State Changed From-To: open->closed Committed. Thanks!