From c8f77fe885b6414ae18a4fe1c2fc0f84f5b42629 Mon Sep 17 00:00:00 2001 From: Thorsten Alteholz Date: Fri, 29 May 2020 11:04:06 +0200 Subject: DLA 2220 --- english/lts/security/2020/dla-2220.data | 10 ++++++++++ english/lts/security/2020/dla-2220.wml | 21 +++++++++++++++++++++ 2 files changed, 31 insertions(+) create mode 100644 english/lts/security/2020/dla-2220.data create mode 100644 english/lts/security/2020/dla-2220.wml diff --git a/english/lts/security/2020/dla-2220.data b/english/lts/security/2020/dla-2220.data new file mode 100644 index 00000000000..5480a410f02 --- /dev/null +++ b/english/lts/security/2020/dla-2220.data @@ -0,0 +1,10 @@ +DLA-2220-1 cracklib2 +2020-5-24 +CVE-2016-6318 +cracklib2 +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2220.wml b/english/lts/security/2020/dla-2220.wml new file mode 100644 index 00000000000..30030f0609e --- /dev/null +++ b/english/lts/security/2020/dla-2220.wml @@ -0,0 +1,21 @@ +LTS security update + + +

It was discovered that there was a stack-based buffer overflow when +parsing large GECOS fields in cracklib2, a pro-active password checker +library.

+ + +

For Debian 8 Jessie, this problem has been fixed in version +2.9.2-1+deb8u1.

+ +

We recommend that you upgrade your cracklib2 packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2220.data" +# $Id: $ -- cgit v1.2.3