Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Jan 2015 14:35:08 -0600 (CST)
From:      "Valeri Galtsev" <galtsev@kicp.uchicago.edu>
To:        "Adam Vande More" <amvandemore@gmail.com>
Cc:        User questions <freebsd-questions@freebsd.org>
Subject:   Re: Linux "Ghost" Remote Code Execution Vulnerability
Message-ID:  <56822.128.135.70.2.1422477308.squirrel@cosmo.uchicago.edu>
In-Reply-To: <CA%2BtpaK30yc5OoOySsB%2BZ0WzmzLFYNHvcedcjBVB0A0weTxg1Sg@mail.gmail.com>
References:  <20150128145247.5086e9a4@scorpio>    <CA%2BtpaK30yc5OoOySsB%2BZ0WzmzLFYNHvcedcjBVB0A0weTxg1Sg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, January 28, 2015 2:24 pm, Adam Vande More wrote:
> On Wed, Jan 28, 2015 at 1:52 PM, Jerry <jerry@seibercom.net> wrote:
>
>> Does this vulnerability affect FreeBSD?
>> https://www.us-cert.gov/ncas/current-activity/2015/01/27/Linux-Ghost-Remote-Code-Execution-Vulnerability

This is glibc gethostbyname:

http://www.openwall.com/lists/oss-security/2015/01/27/9

FreeBSD doesn't use glibc in base system (as far as I know). And I do not
see glibc in ports...

Valeri

>
> Probably the linuxulator.
>

++++++++++++++++++++++++++++++++++++++++
Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247
++++++++++++++++++++++++++++++++++++++++







Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56822.128.135.70.2.1422477308.squirrel>