You probably haven't actually updated anything...you're probably just fine
to do the update.
On Fri, 26 Jan 2001, Randy Perkins wrote:
> hello
> i am using RH7
>
> up2date tells me that glibc needs updating but "The packages were marked to
> be skipped by your configuration"
> under the package retrieval options i have selected " Do not display
> packages when local configuration file has been modified"
>
> What local configuration files have i modified with glibc? i hardly know
> what it is ,. but i did compile a network card driver and
> have updated the kernel to 2.2.18
>
> i would like to update this if possible, what should i do before i update
> the glibc?
>
>
> thanks
>
> randy
>
>
>
>
>
>
>
> ----- Original Message -----
> From: "Mike Burger" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Cc: "me" <[EMAIL PROTECTED]>
> Sent: Friday, January 26, 2001 3:12 PM
> Subject: Re: Applying glibc patch.
>
>
> > That would depend greatly on whether you dynamically or statically linked
> > your applications against the libraries. If you did static linking, then
> > you'd have to recompile them. If they're dynamically linked, then you
> > only have to update the libraries...the applications should make their
> > calls to the dynamic links and have no problems.
> >
> > On Fri, 26 Jan 2001, Curt Seeliger wrote:
> >
> > > Folks,
> > >
> > > If a security patch is required for the C library, this seems to imply
> > > that all applications compiled against the library require
> > > recompilation. Am I mistaken, or do I have a whole lotta work ahead of
> > > me?
> > >
> > > Second, since I'm running 6.2, I'm looking for the appropriate patches
> > > (I've only seen them for 7.0). Is there some reason why 6.2 would be
> > > unpatched -- is it, as far as the vulnerabilities fixed by these
> > > pathces go, more secure than 7.0?
> > >
> > > Thanks for your feedback,
> > >
> > > cur
> > >
> > > ----------
> > >
> > >
> > > Red Hat: 'glibc' vulnerability - 1/11/2001
> > >
> > > A couple of bugs in GNU C library 2.2 allow unpriviledged user to read
> restricted files and preload libraries in /lib and /usr/lib
> > > directories into SUID programs even if those libraries have not been
> marked as such by system administrator.
> > >
> > > ftp://updates.redhat.com/7.0/i386/glibc-2.2-12.i386.rpm
> 91b935bfb0d5fb43394d8557fe754bb4
> > >
> > > ftp://updates.redhat.com/7.0/i386/glibc-common-2.2-12.i386.rpm
> b1218c0c2b6f5bd1e161c3158d0418a5
> > >
> > > ftp://updates.redhat.com/7.0/i386/glibc-devel-2.2-12.i386.rpm
> 0d0bc7d1cd31c548e474146a7cdfea51
> > >
> > > ftp://updates.redhat.com/7.0/i386/glibc-profile-2.2-12.i386.rpm
> 9891a9d1967be619ca74a1de5d0b1f63
> > >
> > > ftp://updates.redhat.com/7.0/i386/nscd-2.2-12.i386.rpm
> d56ba6b8f82c92b9a872e7ee94c706a9
> > >
> > > Vendor Advisory:
> http://www.linuxsecurity.com/advisories/redhat_advisory-1045.html
> > >
> > >
> >
> >
> >
> > _______________________________________________
> > Redhat-list mailing list
> > [EMAIL PROTECTED]
> > https://listman.redhat.com/mailman/listinfo/redhat-list
> >
>
>
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
>
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list