[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Subject: [SECURITY] Debian not vulnerable to recent minicom exploit



Description
-----------

    Recent messages on a computer security forum have again reported
    that there are buffer overflows in minicom.  These can lead into
    root exploits if the program is installed setuid root.

Vulnerability
-------------

    Debian GNU/Linux 2.0 is *not* vulnerable to this exploit.

    The program minicom as shipped with the distribution is not
    installed setuid root.  This is not needed on a Debian GNU/Linux
    system.

--
Debian GNU/Linux    .    Security Managers    .    security@debian.org
              debian-security-announce@lists.debian.org
Christian Hudon <chrish@debian.org> . Martin Schulze <joey@debian.org>

Attachment: pgpZurLZhvEMV.pgp
Description: PGP signature


Reply to: