hello
i am using RH7
up2date tells me that glibc needs updating but "The packages were marked to
be skipped by your configuration"
under the package retrieval options i have selected " Do not display
packages when local configuration file has been modified"
What local configuration files have i modified with glibc? i hardly know
what it is ,. but i did compile a network card driver and
have updated the kernel to 2.2.18
i would like to update this if possible, what should i do before i update
the glibc?
thanks
randy
----- Original Message -----
From: "Mike Burger" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: "me" <[EMAIL PROTECTED]>
Sent: Friday, January 26, 2001 3:12 PM
Subject: Re: Applying glibc patch.
> That would depend greatly on whether you dynamically or statically linked
> your applications against the libraries. If you did static linking, then
> you'd have to recompile them. If they're dynamically linked, then you
> only have to update the libraries...the applications should make their
> calls to the dynamic links and have no problems.
>
> On Fri, 26 Jan 2001, Curt Seeliger wrote:
>
> > Folks,
> >
> > If a security patch is required for the C library, this seems to imply
> > that all applications compiled against the library require
> > recompilation. Am I mistaken, or do I have a whole lotta work ahead of
> > me?
> >
> > Second, since I'm running 6.2, I'm looking for the appropriate patches
> > (I've only seen them for 7.0). Is there some reason why 6.2 would be
> > unpatched -- is it, as far as the vulnerabilities fixed by these
> > pathces go, more secure than 7.0?
> >
> > Thanks for your feedback,
> >
> > cur
> >
> > ----------
> >
> >
> > Red Hat: 'glibc' vulnerability - 1/11/2001
> >
> > A couple of bugs in GNU C library 2.2 allow unpriviledged user to read
restricted files and preload libraries in /lib and /usr/lib
> > directories into SUID programs even if those libraries have not been
marked as such by system administrator.
> >
> > ftp://updates.redhat.com/7.0/i386/glibc-2.2-12.i386.rpm
91b935bfb0d5fb43394d8557fe754bb4
> >
> > ftp://updates.redhat.com/7.0/i386/glibc-common-2.2-12.i386.rpm
b1218c0c2b6f5bd1e161c3158d0418a5
> >
> > ftp://updates.redhat.com/7.0/i386/glibc-devel-2.2-12.i386.rpm
0d0bc7d1cd31c548e474146a7cdfea51
> >
> > ftp://updates.redhat.com/7.0/i386/glibc-profile-2.2-12.i386.rpm
9891a9d1967be619ca74a1de5d0b1f63
> >
> > ftp://updates.redhat.com/7.0/i386/nscd-2.2-12.i386.rpm
d56ba6b8f82c92b9a872e7ee94c706a9
> >
> > Vendor Advisory:
http://www.linuxsecurity.com/advisories/redhat_advisory-1045.html
> >
> >
>
>
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
>
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list