Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Jan 2015 14:52:47 -0500
From:      Jerry <jerry@seibercom.net>
To:        User questions <freebsd-questions@freebsd.org>
Subject:   Linux "Ghost" Remote Code Execution Vulnerability
Message-ID:  <20150128145247.5086e9a4@scorpio>

next in thread | raw e-mail | index | archive | help
--Sig_/XcfEeRY9E2_v9pX/jQsocY3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Does this vulnerability affect FreeBSD?

https://www.us-cert.gov/ncas/current-activity/2015/01/27/Linux-Ghost-Remote=
-Code-Execution-Vulnerability

--=20
Jerry

--Sig_/XcfEeRY9E2_v9pX/jQsocY3
Content-Type: application/pgp-signature
Content-Description: OpenPGP digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJUyT4PAAoJEElTsHIJnX8efRcH+wTl8H211Ni47wUBdOq8wtso
jOmo3Rw2I5lGrXEaKAaEdaYUEdgkC0V+xvurLwmRFiQvVBY6GHW7/WGEDWfMUGY6
bxvypDhOdFTfRV1PxAZK5jnALlcHjIh9vAWTJaANWJbiXOt9Oqw3Gq5tNkj49Nxf
HmZ3V5/IiAVlhShnopfj/HBSbLgxzT0ZSs+BsMbqneM/xKioWa95uOBqrgk7mH7t
OqG92/oic3r2pNsRItDTCoCjk4pKPoAsCPzGzlqi9BVo8yst7+fYDOn9hzeXX5I6
llRSr/3j9POPj+PPG+tkssdC2/zEVH5XcWYm/vV/a7JAWGv1GJEKaIsTL84Qj0w=
=Qt3X
-----END PGP SIGNATURE-----

--Sig_/XcfEeRY9E2_v9pX/jQsocY3--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150128145247.5086e9a4>