-
opie (2.40~dfsg-0ubuntu1.9.04.1) jaunty-security; urgency=low
* SECURITY UPDATE: denial of service and possible code execution via
off-by-one
- libopie/readrec.c: use strncpy so we don't overflow principal.
- http://security.freebsd.org/patches/SA-10:05/opie.patch
- CVE-2010-1938
* libopie/newseed.c: fix snprintf's length argument so opiepasswd will
generate valid seeds. (LP: #569292)
-- Marc Deslauriers <email address hidden> Tue, 08 Jun 2010 11:19:07 -0400
-
opie (2.40~dfsg-0ubuntu1) jaunty; urgency=low
* New upstream version (from 2001), taken from the current OpenSuse srpm.
* Replace the RSA code directly in the repacked tarball.
* Apply patches from the OpenSuse package:
- Fix 'warning: array subscript is above array bounds'.
- Make opie.h C++ safe.
- Fixed a one byte buffer overflow.
- Aadd missing declarations.
- Fixed a single NUL byte overflow.
- Added return value to non-void function (main)
* Pass testsuite and fix build failure on armel.
-- Matthias Klose <email address hidden> Mon, 12 Jan 2009 12:16:09 +0100
-
opie (2.32-10.2build1) feisty; urgency=low
* Rebuild for changes in the amd64 toolchain.
-- Matthias Klose <email address hidden> Mon, 5 Mar 2007 01:24:09 +0000