This bug was fixed in the package cracklib2 - 2.9.2-3
Sponsored for Jeremy Bicha (jbicha)
---------------
cracklib2 (2.9.2-3) unstable; urgency=medium
* Fix "Buffer overflow processing long words" by applying patch from
https://build.opensuse.org/package/view_file/Base:System/cracklib/
0004-overflow-processing-long-words.patch (Closes: #835386)
* remove obsolete debian/pycompat
* change Vcs-* fields to https variants
* Bump Standards-Version to 3.9.8 (no changes)
* Fix "FTCBFS: invokes host-arch executable cracklib-packer" by applying
Helmut Grohne's patch to fix cross compilation (Closes: #792860)
-- Jan Dittberner <[email protected]> Thu, 25 Aug 2016 17:29:17 +0200
cracklib2 (2.9.2-2) unstable; urgency=medium
* Fix "CVE-2016-6318: Stack-based buffer overflow when parsing large
GECOS field" by applying patch by Salvatore Bonaccorso (Closes: #834502)
-- Jan Dittberner <[email protected]> Tue, 23 Aug 2016 18:50:44 +0200
** Also affects: cracklib2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: cracklib2 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1617155
Title:
Sync cracklib2 2.9.2-3 (main) from Debian unstable (main)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cracklib2/+bug/1617155/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs