On Fri, Feb 25, 2011 at 04:22:11PM -0500, Michael Gilbert wrote:
> package: eglibc
> version: 2.11.2-10
> severity: grave
> tag: security
> 
> A memory corruption issue has been disclosed for eglibc [0].  I've
> checked, and lenny (glibc), squeeze, and sid are affected by the poc.
> experimental is not.  According to the report, this permits arbitrary
> code execution.
> 

Do you have a CVE number that we can use in the changelog?

-- 
Aurelien Jarno                          GPG: 1024D/F1BCDB73
[email protected]                 http://www.aurel32.net



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]

Reply via email to