This bug was fixed in the package audit - 1.5.4-0ubuntu1.1
--------------- audit (1.5.4-0ubuntu1.1) gutsy-security; urgency=low
* SECURITY UPDATE: (LP: #216117) + debian/patches/CVE-2008-1628.patch - Stack-based buffer overflow in the audit_log_user_command function in lib/audit_logging.c in Linux Audit before 1.7 might allow remote attackers to execute arbitrary code via a long command argument. * References + http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-1628 + http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475227
-- Emanuele Gentili <email address hidden> Sat, 12 Apr 2008 23:52:13 +0200
This bug was fixed in the package audit - 1.5.4-0ubuntu1.1
---------------
audit (1.5.4-0ubuntu1.1) gutsy-security; urgency=low
* SECURITY UPDATE: (LP: #216117) patches/ CVE-2008- 1628.patch user_command function in audit_logging. c in Linux Audit before 1.7 might allow remote www.cve. mitre.org/ cgi-bin/ cvename. cgi?name= 2008-1628 bugs.debian. org/cgi- bin/bugreport. cgi?bug= 475227
+ debian/
- Stack-based buffer overflow in the audit_log_
lib/
attackers to execute arbitrary code via a long command argument.
* References
+ http://
+ http://
-- Emanuele Gentili <email address hidden> Sat, 12 Apr 2008 23:52:13 +0200