*** This bug is a security vulnerability *** Public security bug reported:
Binary package hint: sarg CVE-2008-1922 description: "Multiple stack-based buffer overflows in Sarg might allow attackers to execute arbitrary code via unknown vectors, probably a crafted Squid log file." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1922 http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html ** Affects: sarg (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-1922 -- [CVE-2008-1922] Multiple buffer overflows in sarg https://bugs.launchpad.net/bugs/236769 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs