Description ----------- Recent messages on a computer security forum have again reported that there are buffer overflows in minicom. These can lead into root exploits if the program is installed setuid root. Vulnerability ------------- Debian GNU/Linux 2.0 is *not* vulnerable to this exploit. The program minicom as shipped with the distribution is not installed setuid root. This is not needed on a Debian GNU/Linux system. -- Debian GNU/Linux . Security Managers . security@debian.org debian-security-announce@lists.debian.org Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>
Attachment:
pgpZurLZhvEMV.pgp
Description: PGP signature