[ELDK] ELDK 5.4 and 'GHOST' glibc bug
Albrecht Dreß
albrecht.dress at arcor.de
Wed Feb 4 22:04:09 CET 2015
Hi Wolfgang:
Thanks a lot for your comprehensive explanations!
Am 02.02.15 22:22 schrieb(en) Wolfgang Denk:
>> It appears, though, that the glibc coming with 5.4 is vulnerable by CVE-2015-0235 (glibc 'GHOST' gethostbyname buffer overflow; [2]).
>
> This is my understanding, too.
I see - looks as if I should re-build glibc from sources as to get rid if that issue... :-/
Thanks,
Albrecht.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 190 bytes
Desc: not available
URL: <http://lists.denx.de/pipermail/eldk/attachments/20150204/2af9bee8/attachment.sig>
More information about the eldk
mailing list