Package: libchasen2 Version: 2.4.4-16 Severity: grave Tags: security JPCERT disclosed an unspecified buffer overflow vulnerability in ChaSen:
<http://jvn.jp/en/jp/JVN16901583/index.html> Apparently, upstream will not provide patches. Would you be willing to work on this issue if we can obtain further details? -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org