Recent messages on a computer security forum have again reported that there are buffer overflows in minicom. These can lead into root exploits if the program is installed setuid root.
Debian GNU/Linux 2.0 is *not* vulnerable to this exploit. The program minicom as shipped with the distribution is not installed setuid root. This is not needed on a Debian GNU/Linux system.
-- Debian GNU/Linux . Security Managers . email@example.com firstname.lastname@example.org Christian Hudon <email@example.com> . Martin Schulze <firstname.lastname@example.org> Attachment: pgpZurLZhvEMV.pgp Description: PGP signature