System News
 1  
Articles for the keywords: glibc
21 Jun 2016 Fedora 24 Now Generally Available, Delivers New Cloud and Container Features [53718]
Adds OpenShift Origin and developer mode for Fedora Atomic Host to drive containerized application development and deployment

The Fedora Project, a Red Hat, Inc., sponsored and community-driven open source collaboration, announced the general availability of Fedora 24, the first 2016 release of the fully-open Fedora operating system. As with previous Fedora releases, Fedora 24 comprises a set of base packages that form the foundation of three distinct editions: Fedora 24 Cloud, Fedora 24 Server, and Fedora 24 Workstation.

At a foundational level, Fedora 24 now includes glibc 2.23 for better performance and improvements to POSIX compliance and GNU Compiler Collection (GCC) 6. All base packages have been rebuilt with GCC 6, providing better code optimization across all Fedora 24 editions and improving the overall stability of each addition.
(Get More Information . .) open to premium members only

19 Feb 2016 Friday Five - February 19, 2016 [50057]
Red Hat, February 19th, 2016

"The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

  • Registration for Red Hat Summit 2016
  • CIO - Red Hat Enterprise Linux is now available on Microsoft Azure
  • GCN - Planning a hybrid cloud? Three things to consider
  • Red Hat Developers is here. A developer's program built for and by developers.
  • eWeek - Linux Systems Patched for Critical glibc Flaw

Read on for details.
(Get More Information . .) open to premium members only

19 Feb 2016 Friday Spotlight: CVE-2015-7547 - KSplice Solves glibc Flaw with Zero-Downtime and No Disruptions [50069]
By Michele Casey

Michele Casey blogs, This week we have seen a new vulnerability making the rounds involving glibc. The issue at hand involves a couple of libraries (libresolv and libnss_dns), which are used commonly with tasks like DNS lookups. Using the function getaddrinfo() could generate a stack buffer overflow with larger replies, which in turn could be used maliciously to trigger an exploit through attacker-controlled domain names, attacker-controlled DNS servers or man-in-the-middle attacks..."
(Get More Information . .) open to premium members only

 
 1  






!-- end archive_section.tpl -->