Debian Security Advisory DSA 636-1 (glibc)

Summary
The remote host is missing an update to glibc announced via advisory DSA 636-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20636-1
Insight
Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provices the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack. For the stable distribution (woody) these problems have been fixed in version 2.2.5-11.8. For the unstable distribution (sid) these problems have been fixed in version 2.3.2.ds1-20. We recommend that you upgrade your libc6 package.