Source: glibc
Version: 2.19-22
Severity: serious
Tags: security fixed-upstream
Control: forwarded -1 https://sourceware.org/bugzilla/show_bug.cgi?id=16009

Hello,

libc6 is vulnerable to buffer overruns in strxfrm() as reported
in the following upstream ticket:
https://sourceware.org/bugzilla/show_bug.cgi?id=16009

The issue is fixed in glibc 2.21.

No CVE has been assigned yet even though it had been requested
in http://openwall.com/lists/oss-security/2015/09/08/2

The upstream patch is available here:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=0f9e585480ed

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/

Reply via email to