eglibc_2.11.3-4+deb6u4_amd64.changes uploaded successfully to
ftp-master.debian.org
along with the files:
eglibc_2.11.3-4+deb6u4.dsc
eglibc_2.11.3-4+deb6u4.diff.gz
glibc-doc_2.11.3-4+deb6u4_all.deb
eglibc-source_2.11.3-4+deb6u4_all.deb
locales_2.11.3-4+deb6u4_all.deb
eglibc_2.11.3-4+deb6u4_amd64.changes uploaded successfully to localhost
along with the files:
eglibc_2.11.3-4+deb6u4.dsc
eglibc_2.11.3-4+deb6u4.diff.gz
glibc-doc_2.11.3-4+deb6u4_all.deb
eglibc-source_2.11.3-4+deb6u4_all.deb
locales_2.11.3-4+deb6u4_all.deb
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 27 Jan 2015 23:57:55 +0100
Source: eglibc
Binary: libc-bin libc-dev-bin glibc-doc eglibc-source locales locales-all nscd
libc6 libc6-dev libc6-dbg libc6-prof libc6-pic libc6-udeb libc6.1 libc6.1-dev
libc6.1-dbg
Hi,
It seems no services were restarted after the recent update. Shouldn't
this be done to ensure the updated code is picked up?
Gr,
Olaf
$ sudo apt-get update
Get:1 http://security.debian.org wheezy/updates Release.gpg [836 B]
Get:2 http://security.debian.org wheezy/updates Release [102 kB]
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Tue, 27 Jan 2015 00:38:49 +0100
Source: eglibc
Binary: libc-bin libc-dev-bin glibc-doc eglibc-source locales locales-all nscd
multiarch-support libc6 libc6-dev libc6-dbg
Processing commands for cont...@bugs.debian.org:
# Fixed in glibc in sid/testing, reassigning to eglibc
# Assuming oldstable to be affected
reassign 776391 eglibc 2.11.3-4
Bug #776391 {Done: Florian Weimer f...@deneb.enyo.de} [libc6]
[CVE-2015-0235]: heap-based buffer overflow in
Package: libc6
Version: 2.19-13
Severity: grave
Tags: security upstream
Justification: user security hole
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
as this has been made public, let's fix it quickly (it might even be a
critical as this is remote):
From:
Processing commands for cont...@bugs.debian.org:
# Reopen and add stable as oldstable and stable diverged
reopen 776391
Bug #776391 {Done: Florian Weimer f...@deneb.enyo.de} [eglibc]
[CVE-2015-0235]: heap-based buffer overflow in __nss_hostname_digits_dots()
Bug reopened
Ignoring request to
Your message dated Tue, 27 Jan 2015 16:40:15 +0100
with message-id 877fw81bc0@mid.deneb.enyo.de
and subject line Re: Bug#776391: [CVE-2015-0235]: heap-based buffer overflow in
__nss_hostname_digits_dots()
has caused the Debian Bug report #776391,
regarding [CVE-2015-0235]: heap-based buffer
eglibc_2.13-38+deb7u7_amd64.changes uploaded successfully to localhost
along with the files:
eglibc_2.13-38+deb7u7.dsc
eglibc_2.13-38+deb7u7.diff.gz
glibc-doc_2.13-38+deb7u7_all.deb
eglibc-source_2.13-38+deb7u7_all.deb
locales_2.13-38+deb7u7_all.deb
libc6_2.13-38+deb7u7_amd64.deb
Processing commands for cont...@bugs.debian.org:
fixed 776391 2.18-1
Bug #776391 [eglibc] [CVE-2015-0235]: heap-based buffer overflow in
__nss_hostname_digits_dots()
There is no source info for the package 'eglibc' at version '2.18-1' with
architecture ''
Unable to make a source version for
Processing commands for cont...@bugs.debian.org:
fixed 776391 2.13-38+deb7u7
Bug #776391 [eglibc] [CVE-2015-0235]: heap-based buffer overflow in
__nss_hostname_digits_dots()
There is no source info for the package 'eglibc' at version '2.13-38+deb7u7'
with architecture ''
Unable to make a
12 matches
Mail list logo