This bug was fixed in the package eglibc - 2.15-0ubuntu20
--------------- eglibc (2.15-0ubuntu20) quantal; urgency=low
* Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498) * Backport another FMA support patch from glibc master branch.
eglibc (2.15-0ubuntu19) quantal-proposed; urgency=low
* SECURITY UPDATE: stack buffer overflow in vfprintf handling (LP: #1031301) - debian/patches/any/CVE-2012-3406.patch: switch to malloc when array grows too large to handle via alloca extension - CVE-2012-3406 * SECURITY UPDATE: stdlib strtod integer/buffer overflows - debian/patches/any/CVE-2012-3480.patch: rearrange calculations and modify types to void integer overflows - CVE-2012-3480 -- Adam Conrad <email address hidden> Wed, 03 Oct 2012 15:58:02 -0600
This bug was fixed in the package eglibc - 2.15-0ubuntu20
---------------
eglibc (2.15-0ubuntu20) quantal; urgency=low
* Backport fixes for dbl-64 and ldbl-128 issues (LP: #1000498)
* Backport another FMA support patch from glibc master branch.
eglibc (2.15-0ubuntu19) quantal-proposed; urgency=low
* SECURITY UPDATE: stack buffer overflow in vfprintf handling patches/ any/CVE- 2012-3406. patch: switch to malloc when patches/ any/CVE- 2012-3480. patch: rearrange calculations
(LP: #1031301)
- debian/
array grows too large to handle via alloca extension
- CVE-2012-3406
* SECURITY UPDATE: stdlib strtod integer/buffer overflows
- debian/
and modify types to void integer overflows
- CVE-2012-3480
-- Adam Conrad <email address hidden> Wed, 03 Oct 2012 15:58:02 -0600