[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 599-1] cracklib2 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : cracklib2
Version        : 2.8.19-3+deb7u1
CVE ID         : CVE-2016-6318
Debian Bug     : 834502

It was discovered that there was a stack-based buffer overflow when
parsing large GECOS fields in cracklib2, a pro-active password checker
library.

For Debian 7 "Wheezy", this issue has been fixed in cracklib2 version
2.8.19-3+deb7u1.

We recommend that you upgrade your cracklib2 packages.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
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=XQsA
-----END PGP SIGNATURE-----


Reply to: