Package: affix-source
Severity: grave
Justification: user security hole

Inproper bounds checking in affix_sock_register() may allow local privilege
escalation. Please see 
http://marc.theaimsgroup.com/?l=bugtraq&m=111445064725591&w=2
for details.

Upstream patch available at http://affix.sourceforge.net/patch_hci_2_1_2

Cheers,
        Moritz

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to