Home / mailingsPDF  

[SECURITY] [DSA 2122-2] New glibc packages fix privilege escalation

Posted on 11 January 2011
Debian Security Advisory

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2122-2 security@debian.org
http://www.debian.org/security/ Florian Weimer
January 11, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : glibc
Vulnerability : missing input sanitization
Problem type : local
Debian-specific: no
CVE ID : CVE-2010-3847 CVE-2010-3856

Colin Watson discovered that the update for stable relased in
DSA-2122-1 did not complete address the underlying security issue in
all possible scenarios.

For the stable distribution (lenny), this problem has been fixed in
version 2.7-18lenny7.

For the testing distribution (squeeze) and the unstable distribution
(sid), this problem will be fixed soon.

We recommend that you upgrade your glibc packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

 

TOP