Package: affix-source Severity: grave Justification: user security hole Inproper bounds checking in affix_sock_register() may allow local privilege escalation. Please see http://marc.theaimsgroup.com/?l=bugtraq&m=111445064725591&w=2 for details.
Upstream patch available at http://affix.sourceforge.net/patch_hci_2_1_2 Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]