drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in GNU C library
Name: |
Ausführen von Code mit höheren Privilegien in GNU C library |
|
ID: |
FEDORA-2017-698daef73c |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 24 |
|
Datum: |
So, 25. Juni 2017, 08:46 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366 |
|
Applikationen: |
GNU C library |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2017-698daef73c 2017-06-24 16:40:56.430365 ------------------------------------------------------------------------------- -
Name : glibc Product : Fedora 24 Version : 2.23.1 Release : 12.fc24 URL : http://www.gnu.org/software/glibc/ Summary : The GNU libc libraries Description : The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets of shared libraries: the standard C library and the standard math library. Without these two libraries, a Linux system will not function.
------------------------------------------------------------------------------- - Update Information:
This update addresses CVE-2017-1000366, a vulnerability in the dynamic linker allowing local privilege escalation. ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1462820 - CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1462820 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade glibc' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
|
|
|
|