This bug was fixed in the package eglibc - 2.10.1-0ubuntu17
--------------- eglibc (2.10.1-0ubuntu17) karmic-security; urgency=low
* SECURITY UPDATE: integer overflow in strfmon() might lead to arbitrary code execution. - debian/patches/any/git-strfmon-overflow.diff: backport from upstream. - CVE-2008-1391 * SECURITY UPDATE: newlines not escaped in /etc/mtab. - debian/patches/any/git-mntent-newline-escape.diff: upstream fixes. - CVE-2010-0296 * SECURITY UPDATE: arbitrary code execution from ELF headers (LP: #542197). - debian/patches/any/git-fix-dtag-cast.diff: upstream fixes. - CVE-2010-0830 * debian/patches/any/git-readdir-padding.diff: fix readdir padding when processing getdents64() in a 32-bit execution environment (LP: #392501). -- Kees Cook <email address hidden> Wed, 19 May 2010 16:57:47 -0700
This bug was fixed in the package eglibc - 2.10.1-0ubuntu17
---------------
eglibc (2.10.1-0ubuntu17) karmic-security; urgency=low
* SECURITY UPDATE: integer overflow in strfmon() might lead to arbitrary patches/ any/git- strfmon- overflow. diff: backport from upstream. patches/ any/git- mntent- newline- escape. diff: upstream fixes. patches/ any/git- fix-dtag- cast.diff: upstream fixes. patches/ any/git- readdir- padding. diff: fix readdir padding when
code execution.
- debian/
- CVE-2008-1391
* SECURITY UPDATE: newlines not escaped in /etc/mtab.
- debian/
- CVE-2010-0296
* SECURITY UPDATE: arbitrary code execution from ELF headers (LP: #542197).
- debian/
- CVE-2010-0830
* debian/
processing getdents64() in a 32-bit execution environment (LP: #392501).
-- Kees Cook <email address hidden> Wed, 19 May 2010 16:57:47 -0700