Package: openslp Severity: grave Tags: security Justification: user security hole
SuSE Security has found several buffer overflows and out-of-memory access possibilities during a code audit. Neither the original SuSE nor the Mandrake advisory contain detailed information, openslp.org lacks usable information as well, but as both SuSE and Mandrake issued advisories the problem seems to require further evaluation. I couldn't find a CAN assignment yet. Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]