According to debian-security-announceat_private: > We have received reports that the netstd suffered from two buffer > overflows. The first problem is an exploitable buffer overflow in the > bootp server. The second problem is an overflow in the FTP client. Both > problems are fixed in a new netstd package, version 3.07-2hamm.4 . What about the version in potato, 3.07-7? Is it vulnerable, too? -- Chip Salzenberg - a.k.a. - <chipat_private> "When do you work?" "Whenever I'm not busy."
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:27:30 PDT