iodine is used for tunneling IPv4 data through a DNS server. It was reported that the 0.7.0 release fixes an authentication bypass. Quoting the upstream commit message: "" The client could bypass the password check by continuing after getting error from the server and guessing the network parameters. The server would still accept the rest of the setup and also network traffic. Add checks for normal and raw mode that user has authenticated before allowing any other communication. Problem found by Oscar Reparaz. "" Upstream commit: https://github.com/yarrick/iodine/commit/b715be5cf3978fbe589b03b09c9398d0d791f850 CVE request: http://seclists.org/oss-sec/2014/q2/543
Created iodine tracking bugs for this issue: Affects: fedora-all [bug 1110181] Affects: epel-all [bug 1110182]
*** This bug has been marked as a duplicate of bug 1110338 ***