Package: libchasen2
Version: 2.4.4-16
Severity: grave
Tags: security

JPCERT disclosed an unspecified buffer overflow vulnerability in
ChaSen:

<http://jvn.jp/en/jp/JVN16901583/index.html>

Apparently, upstream will not provide patches.  Would you be willing
to work on this issue if we can obtain further details?



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to