On Tue, Oct 7, 2008 at 17:43:59 +0200, Thomas Viehmann wrote:
> Please note that this is NOT about this specific overflow. I have found
> it by grepping(!) through the code for string functions for 5 minutes.
> acon needs to be completely redone before being remotely safe,
> preferably in a way t
Package: acon
Version: 1.0.5-7
Severity: grave
Justification: local root
Hi,
as discussed on planet.debian.org and #476603, acon contains unsecure code:
> [Brian M. Carlson]
> > I am subscribed to debian-audit, and we were requested to provide an
> > audit, which I did. My recommendation stands.
2 matches
Mail list logo