[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] glibc vulnerability
- Subject: [ale] glibc vulnerability
- From: mike at trausch.us (Michael Trausch)
- Date: Fri, 30 Jan 2015 15:56:55 -0500
- In-reply-to: <CAAt=rgCPNMp3YENdHsiq9qbQWTa7=2QQKMW8_8sVnQqAR1pE6Q@mail.gmail.com>
- References: <[email protected]> <CAAt=rgBjTLMdh_DzJdW--47ZkXU9odVi=4Bx3wfVW_naR=GdUg@mail.gmail.com> <[email protected]> <[email protected]> <CAAt=rgCPNMp3YENdHsiq9qbQWTa7=2QQKMW8_8sVnQqAR1pE6Q@mail.gmail.com>
It is a vulnerability in the c library which almost all processes use. This is hardly surprising. Complex trigger not withstanding, anti security can be summarized in a single sentence: where there is a will, there is indeed a way.
Sent from my iPhone
> On Jan 30, 2015, at 3:52 PM, James Sumners <james.sumners at gmail.com> wrote:
>
>
>> On Wed, Jan 28, 2015 at 6:12 PM, Michael H. Warfield <mhw at wittsend.com> wrote:
>> This is not son-of-Heartbleed or son-of-Shellshock.
>
> http://arstechnica.com/security/2015/01/critical-ghost-bug-could-haunt-wordpress-and-php-apps-too/
>
>
> --
> James Sumners
> http://james.sumners.info/ (technical profile)
> http://jrfom.com/ (personal site)
> http://haplo.bandcamp.com/ (band page)
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20150130/2bd68757/attachment.html>