Hello.  Is there a patch available to apply to version 2.2.5-14.3, or 
will an upgraded package be available in unstable soon for the following?

Wolfram Gloger discovered that the bugfix from DSA 149-1 unintentially
replaced potential integer overflows in connection with malloc() with
more likely divisions by zero.  This called for an update.  For
completeness the original security advisory said:

  An integer overflow bug has been discovered in the RPC library used
  by GNU libc, which is derived from the SunRPC library.  This bug
  could be exploited to gain unauthorized root access to software
  linking to this code.  The packages below also fix integer overflows
  in the malloc code.

Thanks for any input.

Steve



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to