Bugtraq mailing list archives
[SECURITY] No koules vulnerability
From: debian-security-announce () LISTS DEBIAN ORG
Date: Wed, 22 Nov 2000 13:17:23 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory security () debian org http://www.debian.org/security/ Martin Schulze November 22, 2000 - ------------------------------------------------------------------------ Package : koules Problem type : local root exploit Debian-specific: no Vulnerable : no Guido Bakker has reported a local root vulnerability that can result in local users gaining root permission on a host running koules.sndsrv.linux using a buffer overflow. Debian does not ship koules or parts of it setuid root and thus is not vulnerable to this exploit. - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce () lists debian org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6HDKHW5ql+IAeqTIRAkhAAJwMIG64KoqaB/vvWYilPRi+CGvLmgCgtFdg mxx2hjWYL65S+CzMlyd2ncI= =mMuz -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request () lists debian org with a subject of "unsubscribe". Trouble? Contact listmaster () lists debian org
Current thread:
- [SECURITY] No koules vulnerability debian-security-announce (Nov 24)