Re: glibc-2.5-58.el5_6.2.i686 broken?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Mon, Apr 18, 2011 at 11:36 AM,  <m.roth@xxxxxxxxx> wrote:
> Johnny Hughes wrote:
>> On 04/17/2011 09:52 AM, Leonard den Ottolander wrote:
> <snip>
>>> I would like to advice everyone to avoid this update by adding
>>> exclude=glibc*2.5-58.el5_6.2 nscd*2.5-58.el5_6.2
>>> to their updates channel config - added it to base just to be sure -
>>> until upstream releases a fix.
> <snip>
> So, glibc's broken? Or is the xserver broken as well? And in either case,
> is it only the 32-bit version broken?
>
>          mark, holding off on updating to 5.6 on all his systems....

There is a known issue with one of the security updates on that
version of glibc.

That said, it's still *highly* recommended that you update. There are
four CVEs closed by this glibc update, one of which is potentially a
remote privilege escalation (and that one is NOT the one that is
causing the issue).

If, for some reason, you cannot update then you should seriously
consider whether or not those systems can connect to the Internet, or
if you should get the glibc from Scientific Linux that has the 3
patches that do not cause an issue in the meantime.

Tom Sorensen
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux