Debian Patches
Status for cracklib2/2.9.6-3.4
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
install-debian-python-modules.patch | install Debian specific Python modules | Jan Dittberner <jandd@debian.org> | no | |||
libcrack2-error-safer-check-variant.patch | add a safer check variant | Markus Wanner <markus@bluegap.ch> | no | debian | ||
improve_test_737040.patch | improve Python test to cover low level FascistCheck | Jan Dittberner <jandd@debian.org> | no | debian | ||
CVE-2016-6318.patch | CVE-2016-6318: Stack-based buffer overflow when parsing large GECOS field It is not safe to pass words longer than STRINGSIZE further to cracklib so the longbuffer cannot be longer than STRINGSIZE. |
Salvatore Bonaccorso <carnil@debian.org> | not-needed | debian | vendor, https://bugzilla.redhat.com/attachment.cgi?id=1188599 | 2016-08-16 |
overflow-processing-long-words.patch | The input word is guaranteed to be at most STRINGSIZE-1 in length. One of the mangle operations involves duplicating the input word, resulting in a string twice the length to be accommodated by both area variables. diff -rupN 3/lib/rules.c 3-patched/lib/rules.c |
Howard Guo <hguo@suse.com> | no | debian | 2016-08-17 |
All known versions for source package 'cracklib2'
- 2.10.2-0.1 (experimental)
- 2.9.6-5.2 (trixie, sid)
- 2.9.6-5 (bookworm)
- 2.9.6-3.4 (bullseye)