* SECURITY UPDATE: denial of service and possible code execution via
off-by-one
- libopie/readrec.c: use strncpy so we don't overflow principal.
- http://security.freebsd.org/patches/SA-10:05/opie.patch
- CVE-2010-1938
* libopie/newseed.c: fix snprintf's length argument so opiepasswd will
generate valid seeds. (LP: #569292)
-- Marc Deslauriers <email address hidden> Tue, 08 Jun 2010 11:19:07 -0400
This bug was fixed in the package opie - 2.40~dfsg- 0ubuntu1. 9.10.1
--------------- 0ubuntu1. 9.10.1) karmic-security; urgency=low
opie (2.40~dfsg-
* SECURITY UPDATE: denial of service and possible code execution via security. freebsd. org/patches/ SA-10:05/ opie.patch
off-by-one
- libopie/readrec.c: use strncpy so we don't overflow principal.
- http://
- CVE-2010-1938
* libopie/newseed.c: fix snprintf's length argument so opiepasswd will
generate valid seeds. (LP: #569292)
-- Marc Deslauriers <email address hidden> Tue, 08 Jun 2010 11:19:07 -0400