Linux "Ghost" Remote Code Execution Vulnerability
    Mike Clarke 
    mike at milibyte.co.uk
       
    Wed Jan 28 21:15:12 UTC 2015
    
    
  
On Wed, 28 Jan 2015 14:52:47 -0500
Jerry <jerry at seibercom.net> wrote:
> Does this vulnerability affect FreeBSD?
> 
> https://www.us-cert.gov/ncas/current-activity/2015/01/27/Linux-Ghost-Remote-Code-Execution-Vulnerability
Yes, this morning pkg audit returned this:
linux_base-c6-6.6_1 is vulnerable:
glibc -- gethostbyname buffer overflow
CVE: CVE-2015-0235
WWW:
http://vuxml.FreeBSD.org/freebsd/0765de84-a6c1-11e4-a0c1-c485083ca99c.html
But 6.6_2 which uses a GHOST-free version of glibc was committed to
ports earlier today.
-- 
Mike Clarke
    
    
More information about the freebsd-questions
mailing list