Dear LTS team,
A buffer overflow vulnerability was recently found in the netmask
package (a small utility that helps determining network masks):
https://github.com/tlby/netmask/issues/3
The Security Team argued that the version in stretch (2.4.3-1) doesn't
warrant a DSA as the program is
Hi,
It looks like no advisory was sent out for this upload.
I noticed this while auditing the website for missing advisories. Yu'll
be happy to know that with the current patchset, this is the only older
advisory missing until the 2018 gap due to the mailing list crash. :)
See also:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 01 Feb 2019 20:28:01 -0800
Source: rssh
Binary: rssh
Architecture: source amd64
Version: 2.3.4-4+deb8u2
Distribution: jessie-security
Urgency: high
Maintainer: Russ Allbery
Changed-By: Russ Allbery
Description:
rssh -