Hi Wolfgang: Thanks a lot for your comprehensive explanations!
Am 02.02.15 22:22 schrieb(en) Wolfgang Denk:
It appears, though, that the glibc coming with 5.4 is vulnerable by CVE-2015-0235 (glibc 'GHOST' gethostbyname buffer overflow; [2]).This is my understanding, too.
I see - looks as if I should re-build glibc from sources as to get rid if that issue... :-/ Thanks, Albrecht.
pgpZLWvPvbJaS.pgp
Description: PGP signature
_______________________________________________ eldk mailing list [email protected] http://lists.denx.de/mailman/listinfo/eldk
