Date: Wed, 22 Nov 2000 22:06:53 +0100 From: Martin Schulze <joey@finlandia.infodrom.north.de> To: Debian Security Announcements <debian-security-announce@lists.debian.org> Subject: [SECURITY] No koules vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory security@debian.org http://www.debian.org/security/ Martin Schulze November 22, 2000 - ------------------------------------------------------------------------ Package : koules Problem type : local root exploit Debian-specific: no Vulnerable : no Guido Bakker has reported a local root vulnerability that can result in local users gaining root permission on a host running koules.sndsrv.linux using a buffer overflow. Debian does not ship koules or parts of it setuid root and thus is not vulnerable to this exploit. - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6HDKHW5ql+IAeqTIRAkhAAJwMIG64KoqaB/vvWYilPRi+CGvLmgCgtFdg mxx2hjWYL65S+CzMlyd2ncI= =mMuz -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org