[Please reply to 168383@bugs.debian.org --- see Mail-Followup-To:] Can anyone check if #168383 (buffer overflow in osh, a setuid root shell) is exploitable? If it is, we may need a DSA. -- Oohara Yuuma <oohara@libra.interq.or.jp> Debian developer PGP key (key ID F464A695) http://www.interq.or.jp/libra/oohara/pub-key.txt Key fingerprint = 6142 8D07 9C5B 159B C170 1F4A 40D6 F42E F464 A695 another love --- Treasure, "Radiant Silvergun", attitude #3 for Golets