[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 149-2] New glibc packages fix

> Wolfram Gloger discovered that the bugfix from DSA 149-1 unintentially
> replaced potential integer overflows in connection with malloc() with
> more likely divisions by zero.  This called for an update.

As nearly everything is linked to glibc, does this require a reboot to
be sure? Or is switching to runlevel 1 then back enough?


Reply to: