[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

No root-compromising security holes



severity 24898 normal
quit

After a quick audit of the code, I do not believe that there are any
security holes in cfingerd that could be use to compromise root.
There are potentials for buffer-overflows.  However, none of them
involve any potentially tainted data -- they involve reading config
files and the like -- data that only root could supply to cfingerd
anyway.  Therefore, I set severity to this to normal.

Thanks,
John

-- 
John Goerzen   Linux, Unix consulting & programming   jgoerzen@complete.org |
Developer, Debian GNU/Linux (Free powerful OS upgrade)       www.debian.org |
----------------------------------------------------------------------------+
Visit the Air Capital Linux Users Group on the web at http://www.aclug.org


--  
To UNSUBSCRIBE, email to debian-devel-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


Reply to: