A vulnerability has been reported in DCC, which can potentially be exploited by malicious people to manipulate data. The vulnerability is caused due to an unspecified error and can be exploited to delete or add hosts to "/var/dcc/maps". Solution: Update to version 1.3.51. Reproducible: Didn't try http://www.rhyolite.com/anti-spam/dcc/CHANGES http://secunia.com/advisories/24176/
*** Bug 171150 has been marked as a duplicate of this bug. ***
I tried a trivial bump to latest dcc-1.3.55, but it installs a new binary - /usr/bin/dns-helper, which conflicts with the one installed by gnome-libs (I think). I'll have a closer look at this later today.
dcc-1.3.55 has just been added to the tree. Looks like other distros don't install the dns-helper binary, and dcc seems to work without it...
Thx Andrej. Arches please test and mark stable. Target keywords are: dcc-1.3.55.ebuild:KEYWORDS="alpha amd64 hppa ~ia64 ppc ppc64 sparc x86" Changelog snippet from 1.3.51: Close hole that allowed deleting or adding hosts in /var/dcc/maps.
amd64 done
ppc64 stable
sparc stable. ppc64: you actually didn't stable anything (see the ChangeLog).
whoops.. thanks! good catch! ppc64 now really stable.
ppc stable
Stable for HPPA.
x86 stable
Alpha done.
This one is ready for GLSA vote. I vote NO.
voting no too closing with two votes against a GLSA