[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Fw: CERT Advisory CA-2003-10 Integer overflow in Sun RPC XDR library routines



----- Original Message -----
From: "CERT Advisory" <cert-advisory@cert.org>
To: <cert-advisory@cert.org>
Sent: Wednesday, March 19, 2003 7:53 PM
Subject: CERT Advisory CA-2003-10 Integer overflow in Sun RPC XDR library
routines


>
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> CERT Advisory CA-2003-10 Integer overflow in Sun RPC XDR library routines
>
>    Original release date: March 19, 2003
>    Last revised: --
>    Source: CERT/CC
>
snip...
>
> GNU glibc
>
>    Version 2.3.1 of the GNU C Library is vulnerable. Earlier versions are
>    also  vulnerable.  The  following patches have been installed into the
>    CVS  sources,  and  should  appear  in  the  next version of the GNU C
>    Library. These patches are also available from the following URLs:

Does this affect:
  libstdc++2.10-glibc2.2
  glibc-2.2.5-11.2

If so are the patches in the pipeline?

Apologies if I have missed a posting - unfortunately the volume of recent
off-topic messages has resulted in my heavy filtering of debian-security.

Regards
Jeff



Reply to: