Juergen Daubert
be5eaa216f
See - http://sourceware.org/bugzilla/show_bug.cgi?id=15078 - http://www.security-database.com/detail.php?alert=CVE-2013-0242 Note: To avoid an unclean unmount of "/" on next shutdown, reload the init process after the glibc update. Either run the included post-install script or use the following command: /sbin/telinit U
13 lines
675 B
Plaintext
13 lines
675 B
Plaintext
3402b18f924954aa68d1d59ed378545f glibc-2.16.0-multilib-dirs.patch
|
|
80b181b02ab249524ec92822c0174cf7 glibc-2.16.0.tar.xz
|
|
d4a2a19efe1e9b59b86fd15a968f7e10 glibc-regexp_buffer_overrun.patch
|
|
7e6a5a13c37f93213db9803d9790b7de glibc-resolv_assert.patch
|
|
99ed7b88221475d51a073f00d7ee9c42 glibc-segfault_in_strncasecmp.patch
|
|
8be5a4516a896a4cd589134ccf113575 glibc-strtod_integer_overflow.patch
|
|
96156bec8e05de67384dc93e72bdc313 host.conf
|
|
fbbc215a9b15ba4846f326cc88108057 hosts
|
|
4305991339ee2f5fbce0e1be32d6d3af kernel-headers-3.4.11.tar.xz
|
|
f7fefce570a3c776e26e778c5e401490 ld.so.conf
|
|
75931315bf9bc9be15a5e25e4ddd5f0d nsswitch.conf
|
|
acf9daad1ee85de5efd3543965596a63 resolv.conf
|