-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Tue, 16 Feb 2016 11:21:13 +0100
Source: xdelta3
Binary: xdelta3 python-xdelta3
Architecture: source amd64
Version: 0y.dfsg-1+deb6u1
Distribution: squeeze-lts
Urgency: high
Maintainer: A Mennucc1
Changed-By:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 16 Feb 2016 16:25:44 +0100
Source: wordpress
Binary: wordpress wordpress-l10n
Architecture: source all
Version: 3.6.1+dfsg-1~deb6u9
Distribution: squeeze-lts
Urgency: high
Maintainer: Giuseppe Iuculano
On 2016-02-16 11:15:12, Dolecek, Martin wrote:
> Hi,
>
> glibc has bug (CVE-2015-7547). Now we have an exploit, so can LTS team
> prepare fix?
>
> https://googleonlinesecurity.blogspot.ch/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
I believe this was done already:
Hi,
glibc has bug (CVE-2015-7547). Now we have an exploit, so can LTS team prepare
fix?
https://googleonlinesecurity.blogspot.ch/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
Best regards,
Martin Dolecek, Seznam.cz, Czech Republic