glibc 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.
문서번호 : 1422598843
업데이트 : 2015.01.30
상세내용
- security fix
. CVE-2015-0235
Heap-based buffer overflow in the __nss_hostname_digits_dots function
in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent
attackers to execute arbitrary code via vectors related to the (1)
gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Autoupdates 지원 : 지원
pkgsysupdate
pkgadd -F nscd
pkgadd 전에 pkgdb 를 한번 실행하고 해 주십시오.
update 패키지
RPMS :
. glibc-2.2.4-39.i686.rpm
. glibc-2.2.4-39.i686.rpm
. glibc-common-2.2.4-39.i686.rpm
. glibc-profile-2.2.4-39.i686.rpm
. nscd-2.2.4-39.i686.rpm
SRPMS :
. glibc-2.2.4-39.src.rpm
참고 :
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
http://www.securityfocus.com/archive/1/534555
|