core/glibc
Juergen Daubert be5eaa216f [notify] glibc: security fix for CVE-2013-0242
See
- http://sourceware.org/bugzilla/show_bug.cgi?id=15078
- http://www.security-database.com/detail.php?alert=CVE-2013-0242

Note:
To avoid an unclean unmount of "/" on next shutdown, reload
the init process after the glibc update. Either run the
included post-install script or use the following command:

  /sbin/telinit U
2013-02-12 23:33:02 +01:00
..
.footprint Initial consolidation for core ports for CRUX 3.0 2012-11-22 12:38:39 -06:00
.md5sum [notify] glibc: security fix for CVE-2013-0242 2013-02-12 23:33:02 +01:00
.nostrip create branch for 2.2 2006-02-23 15:26:10 +00:00
glibc-2.16.0-multilib-dirs.patch Initial consolidation for core ports for CRUX 3.0 2012-11-22 12:38:39 -06:00
glibc-regexp_buffer_overrun.patch [notify] glibc: security fix for CVE-2013-0242 2013-02-12 23:33:02 +01:00
glibc-resolv_assert.patch glibc: update to 2.16.0 2012-08-08 10:08:54 +02:00
glibc-segfault_in_strncasecmp.patch glibc: update to kernel headers 3.4.11, apply security related patches from the stable 2.16 branch 2012-09-17 13:10:27 +02:00
glibc-strtod_integer_overflow.patch glibc: update to kernel headers 3.4.11, apply security related patches from the stable 2.16 branch 2012-09-17 13:10:27 +02:00
host.conf create branch for 2.2 2006-02-23 15:26:10 +00:00
hosts create branch for 2.2 2006-02-23 15:26:10 +00:00
ld.so.conf glibc: updated to 2.8. 2008-09-16 20:49:18 +02:00
nsswitch.conf create branch for 2.2 2006-02-23 15:26:10 +00:00
Pkgfile [notify] glibc: security fix for CVE-2013-0242 2013-02-12 23:33:02 +01:00
post-install [notify] glibc: update to 2.12.2 2010-12-23 20:08:57 +01:00
resolv.conf create branch for 2.2 2006-02-23 15:26:10 +00:00