Package: boost1.42 Severity: grave Tags: security patch Justification: user security hole
This is done in unstable, but not in stable up to now so: Please see http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/ The upstream fix and a test case is available here: https://svn.boost.org/trac/boost/changeset/78326 (Copied from #677197) cu AW -- System Information: Debian Release: 6.0.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable'), (50, 'proposed-updates') Architecture: i386 (i686) Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

