This bug was fixed in the package silc-toolkit - 1.1.5-1ubuntu1 --------------- silc-toolkit (1.1.5-1ubuntu1) hardy; urgency=low
* SECURITY UPDATE: arbitrary code execution and denial of service via buffer overflow. - lib/silcutil/silcutil.c: Check the length of the fingerprint. Patch from upstream. (LP: #202752) - References: + CVE-2008-1227 * Modify Maintainer value to match the DebianMaintainerField specification. -- William Grant <[EMAIL PROTECTED]> Sun, 16 Mar 2008 17:11:05 +1100 ** Changed in: silc-toolkit (Ubuntu) Status: Fix Committed => Fix Released -- [CVE-2008-1227] Stack-based buffer overflow causes DoS https://bugs.launchpad.net/bugs/202752 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs