package: eglibc
version: 2.11.2-10
severity: grave
tag: security

A memory corruption issue has been disclosed for eglibc [0].  I've
checked, and lenny (glibc), squeeze, and sid are affected by the poc.
experimental is not.  According to the report, this permits arbitrary
code execution.

[0] http://seclists.org/fulldisclosure/2011/Feb/635



-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20110225162211.83a8d13a.michael.s.gilb...@gmail.com

Reply via email to