This bug was fixed in the package silc-toolkit - 1.1.5-1ubuntu1
---------------
silc-toolkit (1.1.5-1ubuntu1) hardy; urgency=low
* SECURITY UPDATE: arbitrary code execution and denial of service via buffer
overflow.
- lib/silcutil/silcutil.c: Check the length of the fingerprint. Patch from
upstream. (LP: #202752)
- References:
+ CVE-2008-1227
* Modify Maintainer value to match the DebianMaintainerField
specification.
-- William Grant <[EMAIL PROTECTED]> Sun, 16 Mar 2008
17:11:05 +1100
** Changed in: silc-toolkit (Ubuntu)
Status: Fix Committed => Fix Released
--
[CVE-2008-1227] Stack-based buffer overflow causes DoS
https://bugs.launchpad.net/bugs/202752
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs