Package: aiccu
Version: 20070115-9
Severity: normal

If you look at /var/cache/debconf/passwords.dat, you'll probably
find a copy of the password in there. While the file is only
readable by root, this is an unnecessary way to leak the
password.

Best practice for password prompting with debconf is to call
db_reset to clear the password out of the database as soon
as possible after you use it.

-- System Information:
Debian Release: 5.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.27-1-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages aiccu depends on:
ii  debconf                     1.5.24       Debian configuration management sy
ii  iproute                     20080725-2   networking and traffic control too
ii  iputils-ping                3:20071127-1 Tools to test the reachability of 
ii  iputils-tracepath           3:20071127-1 Tools to trace the network path to
ii  libc6                       2.7-18       GNU C Library: Shared libraries
ii  libgnutls26                 2.4.2-4      the GNU TLS library - runtime libr
ii  lsb-base                    3.2-20       Linux Standard Base 3.2 init scrip

Versions of packages aiccu recommends:
ii  ntpdate                 1:4.2.4p4+dfsg-8 client for setting system time fro

aiccu suggests no packages.

-- debconf information excluded

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to