You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa glibc

Sigurnosni nedostatak programskog paketa glibc

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-7e57edc4cc
2016-10-19 09:28:21.086813
——————————————————————————–

Name : glibc-arm-linux-gnu
Product : Fedora 24
Version : 2.24
Release : 2.fc24
URL : http://www.gnu.org/software/libc/
Summary : Cross Compiled GNU C Library targeted at arm-linux-gnu
Description :
This is a Cross Compiled version of the GNU C Library, which can be used to
compile and link binaries for the arm-linux-gnu platform, instead of for the
native platform.

——————————————————————————–
Update Information:

Security fix for CVE-2016-6323.
——————————————————————————–
References:

[ 1 ] Bug #1383297 – CVE-2016-6323 glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace
https://bugzilla.redhat.com/show_bug.cgi?id=1383297
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update glibc-arm-linux-gnu’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-b4c1b24a74
2016-10-19 09:28:04.155072
——————————————————————————–

Name : glibc-arm-linux-gnu
Product : Fedora 23
Version : 2.24
Release : 2.fc23
URL : http://www.gnu.org/software/libc/
Summary : Cross Compiled GNU C Library targeted at arm-linux-gnu
Description :
This is a Cross Compiled version of the GNU C Library, which can be used to
compile and link binaries for the arm-linux-gnu platform, instead of for the
native platform.

——————————————————————————–
Update Information:

Security fix for CVE-2016-6323.
——————————————————————————–
References:

[ 1 ] Bug #1383297 – CVE-2016-6323 glibc: Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace
https://bugzilla.redhat.com/show_bug.cgi?id=1383297
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update glibc-arm-linux-gnu’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

AutorTomislav Protega
Cert idNCERT-REF-2016-10-0129-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost jezgre operacijskog sustava

Otkrivena je ranjivost u verzijama jezgri linux (12.04 LTS, 14.04 LTS, 16.04 LTS, 16.10), linux-lts-trusty (12.04 LTS) i linux-lts-xenial (14.04...

Close