diff -u ssmtp-2.61/ssmtp.c ssmtp-2.61/ssmtp.c --- ssmtp-2.61/ssmtp.c +++ ssmtp-2.61/ssmtp.c @@ -483,6 +483,11 @@ die("from_format() -- snprintf() failed"); } } + else { + if(snprintf(buf, BUF_SZ, "%s", str) == -1) { + die("from_format() -- snprintf() failed"); + } + } } #if 0 @@ -1304,7 +1309,7 @@ ssize_t outbytes = 0; va_start(ap, format); - if(vsnprintf(buf, (BUF_SZ - 2), format, ap) == -1) { + if(vsnprintf(buf, BUF_SZ, format, ap) == -1) { die("smtp_write() -- vsnprintf() failed"); } va_end(ap); diff -u ssmtp-2.61/debian/control ssmtp-2.61/debian/control --- ssmtp-2.61/debian/control +++ ssmtp-2.61/debian/control @@ -1,7 +1,8 @@ Source: ssmtp Section: mail Priority: extra -Maintainer: Anibal Monsalve Salazar +Maintainer: Ubuntu MOTU Developers +XSBC-Original-Maintainer: Anibal Monsalve Salazar Uploaders: Santiago Ruano Rincon Build-Depends: po-debconf, libssl-dev Standards-Version: 3.6.2 diff -u ssmtp-2.61/debian/changelog ssmtp-2.61/debian/changelog --- ssmtp-2.61/debian/changelog +++ ssmtp-2.61/debian/changelog @@ -1,3 +1,15 @@ +ssmtp (2.61-5ubuntu0.1) dapper-security; urgency=low + + * SECURITY UPDATE: allow remote attackers to obtain sensitive + information (LP: #278978) + - patched inline: adjust in ssmtp.c to fix unitialized memory disclosure. + - CVE-2008-3962 + * SECURITY UPDATE: Buffer overflow (LP: #282424) + - patched inline: adjust ssmtp.c to fix a buffer overflow with using 2 + bytes in length instead of one in buffer. + + -- Nicolas Valcárcel Wed, 22 Oct 2008 14:32:59 -0500 + ssmtp (2.61-5) unstable; urgency=high * Fixed "broken pipe -- ssmtp exits before end of input", closes: