Date: Wed, 28 Jan 2015 14:35:08 -0600 (CST) From: "Valeri Galtsev" <galtsev@kicp.uchicago.edu> To: "Adam Vande More" <amvandemore@gmail.com> Cc: User questions <freebsd-questions@freebsd.org> Subject: Re: Linux "Ghost" Remote Code Execution Vulnerability Message-ID: <56822.128.135.70.2.1422477308.squirrel@cosmo.uchicago.edu> In-Reply-To: <CA%2BtpaK30yc5OoOySsB%2BZ0WzmzLFYNHvcedcjBVB0A0weTxg1Sg@mail.gmail.com> References: <20150128145247.5086e9a4@scorpio> <CA%2BtpaK30yc5OoOySsB%2BZ0WzmzLFYNHvcedcjBVB0A0weTxg1Sg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, January 28, 2015 2:24 pm, Adam Vande More wrote: > On Wed, Jan 28, 2015 at 1:52 PM, Jerry <jerry@seibercom.net> wrote: > >> Does this vulnerability affect FreeBSD? >> https://www.us-cert.gov/ncas/current-activity/2015/01/27/Linux-Ghost-Remote-Code-Execution-Vulnerability This is glibc gethostbyname: http://www.openwall.com/lists/oss-security/2015/01/27/9 FreeBSD doesn't use glibc in base system (as far as I know). And I do not see glibc in ports... Valeri > > Probably the linuxulator. > ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?56822.128.135.70.2.1422477308.squirrel>