----- Original Message ----- From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Kamis, 23 Nopember 2000 4:17 Subject: [SECURITY] No koules vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze November 22, 2000 - ------------------------------------------------------------------------ Package : koules Problem type : local root exploit Debian-specific: no Vulnerable : no Guido Bakker has reported a local root vulnerability that can result in local users gaining root permission on a host running koules.sndsrv.linux using a buffer overflow. Debian does not ship koules or parts of it setuid root and thus is not vulnerable to this exploit. - -------------------------------------------------------------------------- -- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: [EMAIL PROTECTED] Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6HDKHW5ql+IAeqTIRAkhAAJwMIG64KoqaB/vvWYilPRi+CGvLmgCgtFdg mxx2hjWYL65S+CzMlyd2ncI= =mMuz -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
