[ELDK] ELDK 5.4 and 'GHOST' glibc bug

Albrecht Dreß albrecht.dress at arcor.de
Wed Feb 4 22:04:09 CET 2015

Hi Wolfgang:

Thanks a lot for your comprehensive explanations!

Am 02.02.15 22:22 schrieb(en) Wolfgang Denk:
>> It appears, though, that the glibc coming with 5.4 is vulnerable by CVE-2015-0235 (glibc 'GHOST' gethostbyname buffer overflow; [2]).
> This is my understanding, too.

I see - looks as if I should re-build glibc from sources as to get rid if that issue... :-/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 190 bytes
Desc: not available
URL: <http://lists.denx.de/pipermail/eldk/attachments/20150204/2af9bee8/attachment.sig>

More information about the eldk mailing list