This bug was fixed in the package silc-toolkit - 1.1.5-1ubuntu1

---------------
silc-toolkit (1.1.5-1ubuntu1) hardy; urgency=low

  * SECURITY UPDATE: arbitrary code execution and denial of service via buffer
    overflow.
    - lib/silcutil/silcutil.c: Check the length of the fingerprint. Patch from
      upstream. (LP: #202752)
    - References:
      + CVE-2008-1227
  * Modify Maintainer value to match the DebianMaintainerField
    specification.

 -- William Grant <[EMAIL PROTECTED]>   Sun, 16 Mar 2008
17:11:05 +1100

** Changed in: silc-toolkit (Ubuntu)
       Status: Fix Committed => Fix Released

-- 
[CVE-2008-1227] Stack-based buffer overflow causes DoS
https://bugs.launchpad.net/bugs/202752
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to