Package: chetcpassword
Severity: normal
Please see #394454. Plus, it copies lots of server and user-provided
data into buffers of static size, possibly allowing code injection
as well. Security-sensitive password software shouldn't have such
gaping issues. It's too buggy even for sid, so it should be removed.
Cheers,
Moritz
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-1-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]