[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Subject: [SECURITY] Debian not vulnerable to recent minicom exploit


    Recent messages on a computer security forum have again reported
    that there are buffer overflows in minicom.  These can lead into
    root exploits if the program is installed setuid root.


    Debian GNU/Linux 2.0 is *not* vulnerable to this exploit.

    The program minicom as shipped with the distribution is not
    installed setuid root.  This is not needed on a Debian GNU/Linux

Debian GNU/Linux    .    Security Managers    .    security@debian.org
Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>

Attachment: pgpZurLZhvEMV.pgp
Description: PGP signature

Reply to: