On Tuesday, August 13, 2002, at 03:21 AM, Martin Schulze wrote:
-
--------------------------------------------------------------------------
Debian Security Advisory DSA 149-1
[EMAIL PROTECTED]
http://www.debian.org/security/ Martin
Schulze
August 13th, 2002
-
--------------------------------------------------------------------------
Package : glibc
Vulnerability : integer overflow
Problem-Type : remote
Debian-specific: no
CVE Id : CAN-2002-0391
CERT advisory : VU#192995
Anyone aware of any particular daemon's that need to be restarted just
to be safe? I'd rather not have to type in the SSL passphrase for
apache+mod_ssl if I don't have to.
--
Paul Baker
"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
-- Benjamin Franklin, 1759
GPG Key: http://homepage.mac.com/pauljbaker/public.asc