Hi Wolfgang:

Thanks a lot for your comprehensive explanations!

Am 02.02.15 22:22 schrieb(en) Wolfgang Denk:
It appears, though, that the glibc coming with 5.4 is vulnerable by 
CVE-2015-0235 (glibc 'GHOST' gethostbyname buffer overflow; [2]).

This is my understanding, too.

I see - looks as if I should re-build glibc from sources as to get rid if that 
issue... :-/

Thanks,
Albrecht.

Attachment: pgpZLWvPvbJaS.pgp
Description: PGP signature

_______________________________________________
eldk mailing list
[email protected]
http://lists.denx.de/mailman/listinfo/eldk

Reply via email to