Tom Sorensen wrote: > On Mon, Apr 18, 2011 at 11:36 AM, <m.roth@xxxxxxxxx> wrote: >> Johnny Hughes wrote: >>> On 04/17/2011 09:52 AM, Leonard den Ottolander wrote: >> <snip> >>>> I would like to advice everyone to avoid this update by adding >>>> exclude=glibc*2.5-58.el5_6.2 nscd*2.5-58.el5_6.2 >>>> to their updates channel config - added it to base just to be sure - >>>> until upstream releases a fix. >> <snip> >> So, glibc's broken? Or is the xserver broken as well? And in either >> case, is it only the 32-bit version broken? >> >> mark, holding off on updating to 5.6 on all his systems.... > > There is a known issue with one of the security updates on that > version of glibc. > > That said, it's still *highly* recommended that you update. There are > four CVEs closed by this glibc update, one of which is potentially a > remote privilege escalation (and that one is NOT the one that is > causing the issue). <snip> Except for a handful, all of my systems are on 5.5. I don't have to update until this is fixed.... mark _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos