Mailing the story:

Debian alert: New glibc packages fix arbitrary code execution

  • Mailing list (Posted by on CST)
  • Story Type: Security; Groups: Debian
eEye Digital Security discovered an integer overflow in the xdrmem_getbytes() function which is also present in GNU libc. This function is part of the XDR (external data representation) encoder/decoder derived from Sun's RPC implementation. Depending upon the application, this vulnerability can cause buffer overflows and could possibly be exploited to execute arbitray code.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?