[Bug 1617155] [NEW] Sync cracklib2 2.9.2-3 (main) from Debian unstable (main)
Jeremy Bicha
jbicha at linux.com
Fri Aug 26 05:02:06 UTC 2016
*** This bug is a security vulnerability ***
Public security bug reported:
Please sync cracklib2 2.9.2-3 (main) from Debian unstable (main)
Changelog entries since current yakkety version 2.9.2-1build2:
cracklib2 (2.9.2-3) unstable; urgency=medium
* Fix "Buffer overflow processing long words" by applying patch from
https://build.opensuse.org/package/view_file/Base:System/cracklib/
0004-overflow-processing-long-words.patch (Closes: #835386)
* remove obsolete debian/pycompat
* change Vcs-* fields to https variants
* Bump Standards-Version to 3.9.8 (no changes)
* Fix "FTCBFS: invokes host-arch executable cracklib-packer" by applying
Helmut Grohne's patch to fix cross compilation (Closes: #792860)
-- Jan Dittberner <jandd at debian.org> Thu, 25 Aug 2016 17:29:17 +0200
cracklib2 (2.9.2-2) unstable; urgency=medium
* Fix "CVE-2016-6318: Stack-based buffer overflow when parsing large
GECOS field" by applying patch by Salvatore Bonaccorso (Closes: #834502)
-- Jan Dittberner <jandd at debian.org> Tue, 23 Aug 2016 18:50:44 +0200
** Affects: cracklib2 (Ubuntu)
Importance: Wishlist
Status: New
** Affects: cracklib2 (Debian)
Importance: Unknown
Status: Unknown
** Changed in: cracklib2 (Ubuntu)
Importance: Undecided => Wishlist
** Information type changed from Public to Public Security
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6318
** Bug watch added: Debian Bug tracker #834502
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834502
** Also affects: cracklib2 (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834502
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Sponsors Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1617155
Title:
Sync cracklib2 2.9.2-3 (main) from Debian unstable (main)
Status in cracklib2 package in Ubuntu:
New
Status in cracklib2 package in Debian:
Unknown
Bug description:
Please sync cracklib2 2.9.2-3 (main) from Debian unstable (main)
Changelog entries since current yakkety version 2.9.2-1build2:
cracklib2 (2.9.2-3) unstable; urgency=medium
* Fix "Buffer overflow processing long words" by applying patch from
https://build.opensuse.org/package/view_file/Base:System/cracklib/
0004-overflow-processing-long-words.patch (Closes: #835386)
* remove obsolete debian/pycompat
* change Vcs-* fields to https variants
* Bump Standards-Version to 3.9.8 (no changes)
* Fix "FTCBFS: invokes host-arch executable cracklib-packer" by applying
Helmut Grohne's patch to fix cross compilation (Closes: #792860)
-- Jan Dittberner <jandd at debian.org> Thu, 25 Aug 2016 17:29:17 +0200
cracklib2 (2.9.2-2) unstable; urgency=medium
* Fix "CVE-2016-6318: Stack-based buffer overflow when parsing large
GECOS field" by applying patch by Salvatore Bonaccorso (Closes: #834502)
-- Jan Dittberner <jandd at debian.org> Tue, 23 Aug 2016 18:50:44 +0200
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cracklib2/+bug/1617155/+subscriptions
More information about the Ubuntu-sponsors
mailing list